Networking Domain Name System

Size: px
Start display at page:

Download "Networking Domain Name System"

Transcription

1 System i Networking Domain Name System Version 6 Release 1

2

3 System i Networking Domain Name System Version 6 Release 1

4 Note Before using this information and the product it supports, read the information in Notices, on page 43. This edition applies to version 6, release 1, modification 0 of IBM i5/os (product number 5761-SS1) and to all subsequent releases and modifications until otherwise indicated in new editions. This version does not run on all reduced instruction set computer (RISC) models nor does it run on CISC models. Copyright IBM Corporation 1998, US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

5 Contents Domain Name System PDF file for Domain Name System Domain Name System concepts Understanding zones Understanding Domain Name System queries.. 3 Domain Name System domain setup Dynamic updates BIND 9 features Domain Name System resource records Mail and Mail Exchanger records Examples: Domain Name System Example: Single Domain Name System server for an intranet Example: Single Domain Name System server with Internet access Example: Domain Name System and Dynamic Host Configuration Protocol on the same System i Example: Splitting DNS over firewall by setting up two DNS servers on the same System i Example: Splitting DNS over firewall by using view Planning for Domain Name System Determining Domain Name System authorities 24 Determining domain structure Planning security measures Domain Name System requirements Determining if Domain Name System is installed 26 Installing Domain Name System Configuring Domain Name System Accessing Domain Name System in System i Navigator Configuring name servers Creating a name server instance Editing Domain Name System server properties Configuring zones on a name server Configuring views on a name server Configuring Domain Name System to receive dynamic updates Importing Domain Name System files Record validation Accessing external Domain Name System data 30 Managing Domain Name System Verifying the Domain Name System function is working Managing security keys Managing Domain Name System keys Managing dynamic update keys Accessing Domain Name System server statistics 33 Accessing server statistics Accessing an active server database Maintaining Domain Name System configuration files Advanced Domain Name System features Starting or stopping Domain Name System servers Changing debug values Troubleshooting Domain Name System Logging Domain Name System server messages 37 Changing Domain Name System debug settings 40 Related information for Domain Name System.. 40 Appendix. Notices Programming interface information Trademarks Terms and conditions Copyright IBM Corp. 1998, 2008 iii

6 iv System i: Networking Domain Name System

7 Domain Name System Domain Name System (DNS) is a distributed database system for managing host names and their associated Internet Protocol (IP) addresses. With DNS, people can use simple names, such as to locate a host, rather than using the IP addresses, for example, in IPv4, or 2001:D88::1 in IPv6. A single server might be responsible only for knowing the host names and IP addresses for a small part of a zone, but DNS servers can work together to map all domain names to their IP addresses. DNS servers that work together allow computers to communicate across the Internet. For IBM i Version 6 Release 1 (V6R1), DNS services are based on the industry-standard DNS implementation, known as Berkeley Internet Name Domain (BIND) version 9. For previous IBM i releases, DNS services were based on BIND version To use the new BIND version 9 DNS server, you must have IBM i option 31 (DNS) and option 33 (Portable Application Solutions Environment (PASE)) installed. As of IBM i V6R1, for security reasons, BIND 4 and 8 are replaced with BIND 9. Thus, the migration to BIND 9 is required for your DNS server. PDF file for Domain Name System You can view and print a PDF file of this information. To view or download the PDF version of this document, select Domain Name System (about 625 KB). Saving PDF files To save a PDF on your workstation for viewing or printing: 1. Right-click the PDF link in your browser. 2. Click the option that saves the PDF locally. 3. Navigate to the directory in which you want to save the PDF. 4. Click Save. Downloading Adobe Reader You need Adobe Reader installed on your system to view or print these PDFs. You can download a free copy from the Adobe Web site ( Related reference: Related information for Domain Name System on page 40 IBM Redbooks publications, Web sites, and other information center topic collections contain information that relates to the Domain Name System (DNS) topic collection. You can view or print any of the PDF files. Domain Name System concepts Domain Name System (DNS) is a distributed database system for managing host names and their associated Internet Protocol (IP) addresses. With DNS, you can use simple names, such as to locate a host, rather than using the IP addresses, for example, in IPv4, or 2001:D88::1 in IPv6. Copyright IBM Corp. 1998,

8 A single server might be responsible only for knowing the host names and IP addresses for a small part of a zone, but DNS servers can work together to map all domain names to their IP addresses. DNS servers that work together allows computers to communicate across the Internet. DNS data is broken up into a hierarchy of domains. Servers are responsible to know only a small portion of data, such as a single subdomain. The portion of a domain for which the server is directly responsible is called a zone. A DNS server that has complete host information and data for a zone is authoritative for the zone. An authoritative server can answer queries about hosts in its zone, using its own resource records. The query process depends on a number of factors. Understanding DNS queries explains the paths that a client can use to resolve a query. Understanding zones Domain Name System (DNS) data is divided into manageable sets of data called zones. And each of these sets is a specific zone type. Zones contain name and IP address information about one or more parts of a DNS domain. A server that contains all of the information for a zone is the authoritative server for the domain, called a parent zone. Sometimes it makes sense to delegate the authority for answering DNS queries for a particular subdomain to another DNS server, called a child zone. In this case, the DNS server for the domain can be configured to refer the subdomain queries to the appropriate server. For backup and redundancy, zone data is often stored on servers other than the authoritative DNS server. These other servers are called secondary servers, which load zone data from the authoritative server. Configuring secondary servers allows you to balance the demand on servers and also provides a backup in case the primary server goes down. Secondary servers obtain zone data by doing zone transfers from the authoritative server. When a secondary server is initialized, it loads a complete copy of the zone data from the primary server. The secondary server also reloads zone data from the primary server or from other secondaries for that domain when zone data changes. DNS zone types You can use IBM i DNS to define several types of zones to help you manage DNS data: Primary zone A primary zone loads zone data directly from a file on a host. It can contain a subzone, or child zone. It can also contain resource records, such as host, alias (CNAME), IPv4 address (A), IPv6 address (AAAA), or reverse mapping pointer (PTR) records. Note: Primary zones are sometimes referred to as master zones in other BIND documentation. Subzone A subzone defines a zone within the primary zone. Subzones allow you to organize zone data into manageable pieces. Child zone A child zone defines a subzone and delegates responsibility for the subzone data to one or more name servers. Alias (CNAME) An alias defines an alternate name for a primary domain name. Host A host object maps A and PTR records to a host. Additional resource records can be associated with a host. Secondary zone A secondary zone loads zone data from a zone's primary server or another secondary server. It maintains a complete copy of the zone for which it is a secondary. 2 System i: Networking Domain Name System

9 Note: Secondary zones are sometimes referred to as slave zones in other BIND documentation. Stub zone A stub zone is similar to a secondary zone, but it only transfers the name server (NS) records for that zone. Forward zone A forward zone directs all queries for that particular zone to other servers. Related concepts: Understanding Domain Name System queries Domain Name System (DNS) clients use DNS servers to resolve queries. The queries might come directly from the client or from an application running on the client. Related tasks: Configuring zones on a name server on page 28 After you configure a Domain Name System (DNS) server instance, you need to configure the zones for the name server. Related reference: Example: Single Domain Name System server for an intranet on page 14 This example depicts a simple subnet with a Domain Name System (DNS) server for internal use. Domain Name System resource records on page 9 Resource records are used to store data about domain names and IP addresses. You can use the Resource record lookup table to look into the resource records supported for the IBM i operating system. Understanding Domain Name System queries Domain Name System (DNS) clients use DNS servers to resolve queries. The queries might come directly from the client or from an application running on the client. The client sends a query message to the DNS server that contains a fully qualified domain name (FQDN), a query type, such as a particular resource record the client requires, and the class for the domain name, which is typically the Internet (IN) class. The following figure depicts the sample network from the Single DNS server with Internet access example. Domain Name System 3

10 Figure 1. Single DNS server with Internet access Suppose that host dataentry queries the DNS server for graphics.mycompany.com. The DNS server uses its own zone data and responds with the IP address Now suppose dataentry requests the IP address of This host is not in the DNS server's zone data. Two paths can be followed: recursion or iteration. If a DNS server is set to use recursion, the server can query or contact other DNS servers on behalf of the requesting client to fully resolve the name, and then send an answer back to the client. Additionally, the requesting server stores the answer into its cache so that the answer can be used the next time that the server receives that query. If a DNS server is set to use iteration, a client can attempt to contact other DNS servers on its own to resolve a name. In this process, the client uses separate and additional queries based on referral answers from servers. 4 System i: Networking Domain Name System

11 Related reference: Understanding zones on page 2 Domain Name System (DNS) data is divided into manageable sets of data called zones. And each of these sets is a specific zone type. Example: Single Domain Name System server with Internet access on page 16 This example depicts a simple subnet with a Domain Name System (DNS) server connected directly to the Internet. Domain Name System domain setup Domain Name System (DNS) domain setup requires domain name registration to prevent others from using your domain name. DNS allows you to serve names and addresses on an intranet, or internal network. It also allows you to serve names and addresses to the rest of the world through the Internet. If you want to set up domains on the Internet, you are required to register a domain name. If you are setting up an intranet, you are not required to register a domain name for internal use. Whether to register an intranet name depends on whether you want to ensure that no one else can ever use the name on the Internet, independent of your internal use. Registering a name that you are going to use internally ensures that you will never have a conflict if you later want to use the domain name externally. Domain registration can be performed by direct contact with an authorized domain name registrar, or through some Internet Service Providers (ISPs). Some ISPs offer a service to submit domain name registration requests on your behalf. The Internet Network Information Center (InterNIC) maintains a directory of all domain name registrars that are authorized by the Internet Corporation for Assigned Names and Numbers (ICANN). Related reference: Example: Single Domain Name System server with Internet access on page 16 This example depicts a simple subnet with a Domain Name System (DNS) server connected directly to the Internet. Related information: Internet Network Information Center (InterNIC) Dynamic updates IBM i Domain Name System (DNS) that is based on BIND 9 supports dynamic updates. Outside sources, such as Dynamic Host Configuration Protocol (DHCP), can send updates to the DNS server. In addition, you can also use DNS client tools, such as Dynamic Update Utility (NSUPDATE), to perform dynamic updates. DHCP is a TCP/IP standard that uses a central server to manage IP addresses and other configuration details for an entire network. A DHCP server responds to requests from clients, dynamically assigning properties to them. DHCP allows you to define network host configuration parameters at a central location and automate the configuration of hosts. It is often used to assign temporary IP addresses to clients for networks that contain more clients than the number of IP addresses available. In the past, all DNS data was stored in static databases. All DNS resource records had to be created and maintained by the administrator. But, DNS servers that are based on BIND 8, or later, can be configured to accept requests from other sources to update zone data dynamically. You can configure your DHCP server to send update requests to the DNS server each time it assigns a new address to a host. This automated process reduces DNS server administration in rapidly growing or changing TCP/IP networks, and in networks where hosts change locations frequently. When a client Domain Name System 5

12 using DHCP receives an IP address, that data is immediately sent to the DNS server. Using this method, DNS can continue to successfully resolve queries for hosts, even when their IP addresses change. You can configure DHCP to update address mapping (A for IPv4 or AAAA for IPv6) records, reverse-lookup pointer (PTR) records, or both on behalf of a client. The address mapping record (A or AAAA) maps a machine's host name to its IP address. The PTR record maps a machine's IP address to its host name. When a client's address changes, DHCP can automatically send an update to the DNS server so other hosts in the network can locate the client through DNS queries at the client's new IP address. For each record that is updated dynamically, an associated Text (TXT) record is written to identify that the record was written by DHCP. Note: If you set DHCP to update only PTR records, you must configure DNS to allow updates from clients so that every client can update its A record if the client uses IPv4 address, or update its AAAA record if the client uses IPv6 address. Not all DHCP clients support making their own A or AAAA record update requests. Consult the documentation for your client platform before choosing this method. Dynamic zones are secured by creating a list of authorized sources that are allowed to send updates. You can define authorized sources using individual IP addresses, whole subnets, packets that have been signed using a shared secret key (called a Transaction Signature, or TSIG), or any combination of those methods. DNS verifies that incoming request packets are coming from an authorized source before updating the resource records. Dynamic updates can be performed between DNS and DHCP on a single System i platform, between different System i platforms, or between a System i platform and other systems that are capable of dynamic updates. Note: The dynamic Update DNS (QTOBUPDT) API is required on servers that are sending dynamic updates to DNS. It is installed automatically with IBM i Option 31, DNS. However, in BIND 9, the NSUPDATE command is the preferred method to make the updates on the System i platform. 6 System i: Networking Domain Name System

13 Related concepts: Dynamic Host Configuration Protocol Related tasks: Configuring Domain Name System to receive dynamic updates on page 29 Domain Name System (DNS) servers running BIND 9 can be configured to accept requests from other sources to update zone data dynamically. This topic provides instructions for configuring the allow-update option so DNS can receive dynamic updates. Configuring the DHCP to send dynamic updates to DNS Related reference: Example: Domain Name System and Dynamic Host Configuration Protocol on the same System i on page 18 This example depicts Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) on the same System i platform. Domain Name System resource records on page 9 Resource records are used to store data about domain names and IP addresses. You can use the Resource record lookup table to look into the resource records supported for the IBM i operating system. QTOBUPT BIND 9 features BIND 9 is similar to BIND 8; however, it provides several features to enhance performance of your Domain Name System (DNS) server, such as views. BIND 9 features BIND 9 is similar to BIND 8; however, it provides several features to enhance performance of your Domain Name System (DNS) server, such as views. Views on a single IBM i DNS server The view statement allows a single DNS instance to answer a query differently depending on where the query comes from, such as the Internet or an intranet. One practical application of the view feature is to split DNS setups without having to run multiple DNS servers. For example, in a single DNS server, you can define a view to answer queries from an internal network, while define another view to answer queries from external network. New client commands The following client commands enhance the management capability of your DNS server: Dynamic Update Utility (NSUPDATE) The Dynamic Update Utility (NSUPDATE) command is used to submit Dynamic DNS Update requests as defined in Request for Comments (RFC) 2136 to a DNS server. This allows resource records to be added or removed from a zone while the DNS server is running. Thus, you do not need to update records by manually editing the zone file. A single update request can contain requests to add or remove multiple resource records, but the resource records that are dynamically added or removed with the NSUPDATE command should be in the same zone. Note: Do not manually edit zones that are under dynamic control by using the NSUPDATE command or through a DHCP server. Manual edits might conflict with dynamic updates and cause data to be lost. Start DIG Query (DIG) Domain Information Groper (DIG) is a more powerful query tool, compared with the Name Server Lookup (NSLOOKUP) command, that you can use to retrieve information from a DNS server or test the response of a DNS server. The NSLOOKUP command is deprecated and is only provided Domain Name System 7

14 for compatibility with earlier versions. You can use DIG to verify that a DNS server is responding correctly before you configure your system to use it. You can also retrieve DNS information about hosts, domains, and other DNS servers by using DIG. You can use the Start DIG Query (STRDIGQRY) command or its alias DIG to start the Domain Information Groper tool. Start HOST Query (HOST) The Start HOST Query (HOST) command is used for DNS lookups. You can use it to convert domain names to IP addresses (either IPv4 or IPv6) and vice versa. Remote Name Daemon Control (RNDC) The Remote Name Daemon Control (RNDC) command is a powerful utility that allows a system administrator to control the operation of a name server. It reads a configuration file, called rndc.conf, to determine how to contact the name server and to determine what algorithm and key it should use. If no rndc.conf file is found, then, by default, an rndc-key._kid file that is created during installation is used, which automatically grants access through the loopback interface. IPv6 support BIND 9 supports name-to-address and address-to-name lookups in all currently defined forms of IPv6. For forward lookups, BIND 9 supports both AAAA and A6 records, but A6 records are now deprecated. For IPv6 reverse lookups, it supports the traditional nibble format used in the ip6.arpa domain, as well as the older, deprecated ip6.int domain. Journal files Journal files are used to hold dynamic updates for a zone. It is automatically created when the first dynamic update from a client is received, and does not disappear. This is a binary file and should not be edited. With the journal file, when a server is restarted after a shutdown or crash, it replays the journal file to incorporate into the zone any updates that took place after the last zone dump. Journal files are also used to store updates for the incremental zone transfers (IXFR) method. DNS for IBM i has been redesigned to use BIND 9. To run BIND 9 DNS on your system, your system must meet certain software requirements. 8 System i: Networking Domain Name System

15 Related concepts: Domain Name System requirements on page 26 Consider these software requirements to run Domain Name System (DNS) on your System i platform. Dynamic updates on page 5 IBM i Domain Name System (DNS) that is based on BIND 9 supports dynamic updates. Outside sources, such as Dynamic Host Configuration Protocol (DHCP), can send updates to the DNS server. In addition, you can also use DNS client tools, such as Dynamic Update Utility (NSUPDATE), to perform dynamic updates. Related reference: Example: Splitting DNS over firewall by setting up two DNS servers on the same System i on page 20 This example depicts a Domain Name System (DNS) server that operates over a firewall to protect internal data from the Internet, while allowing internal users to access data on the Internet. This configuration accomplishes this protection by setting up two DNS servers on the same System i platform. Planning security measures on page 25 Domain Name System (DNS) provides security options to limit outside access to your server. Domain Name System resource records Resource records are used to store data about domain names and IP addresses. You can use the Resource record lookup table to look into the resource records supported for the IBM i operating system. A DNS zone database is made up of a collection of resource records. Each resource record specifies information about a particular object. For example, address mapping (A) records map a host name to an IP address, and reverse-lookup pointer (PTR) records map an IP address to a host name. The server uses these records to answer queries for hosts in its zone. For more information, use the table to view DNS resource records. Note: The entries in the resource record lookup table might be added or removed according to the change of the BIND document. Also, this is not a comprehensive list of all resource records listed in BIND. Table 1. Resource record lookup table Resource record Abbreviation Description Address Mapping records A The A record specifies the IP address of this host. A records are used to resolve a query for the IP address of a specific domain name. This record type is defined in Request for Comments (RFC) Andrew File System Database records AFSDB The AFSDB record specifies the AFS or DCE address of the object. AFSDB records are used like A records to map a domain name to its AFSDB address; or to map from the domain name of a cell to authenticated name servers for that cell. This record type is defined in RFC Canonical Name records CNAME The CNAME record specifies the actual domain name of this object. When DNS queries an aliased name and finds a CNAME record pointing to the canonical name, it then queries that canonical domain name. This record type is defined in RFC Domain Name System 9

16 Table 1. Resource record lookup table (continued) Resource record Abbreviation Description Host Information records HINFO The HINFO record specifies general information about a host. Standard CPU and operating system names are defined in the Assigned Numbers RFC However, use of the standard numbers is not required. This record type is defined in RFC Integrated Services Digital Network records ISDN The ISDN record specifies the address of this object. This record maps a host name to the ISDN address. They are used only in ISDN networks. This record type is defined in RFC IP Version 6 Address records AAAA The AAAA record specifies the 128-bit IPv6 address of a host. AAAA records, which are similar to A records, are used to resolve queries for the IPv6 address of a specific domain name. This record type is defined in RFC Location records LOC The LOC record specifies the physical location of network components. These records can be used by applications to evaluate network efficiency or map the physical network. This record type is defined in RFC Mail Exchanger records MX The MX records defines a mail exchanger host for mail sent to this domain. These records are used by Simple Mail Transfer Protocol (SMTP) to locate hosts that processes or forwards mail for this domain, along with preference values for each mail exchanger host. Each mail exchanger host must have a corresponding host address (A) records in a valid zone. This record type is defined in RFC Mail Group records MG The MG records specifies the mail group domain name. This record type is defined in RFC Mailbox records MB The MB records specifies the host domain name which contains the mailbox for this object. Mail sent to the domain is directed to the host specified in the MB record. This record type is defined in RFC System i: Networking Domain Name System

17 Table 1. Resource record lookup table (continued) Resource record Abbreviation Description Mailbox Information records MINFO The MINFO records specifies the mailbox that should receive messages or errors for this object. The MINFO record is more commonly used for mailing lists than for a single mailbox. This record type is defined in RFC Mailbox Rename records MR The MR records specifies a new domain name for a mailbox. Use the MR record as a forwarding entry for a user who has moved to a different mailbox. This record type is defined in RFC Name Server records NS The NS record specifies an authoritative name server for this host. This record type is defined in RFC Network Service Access Protocol records NSAP The NSAP record specifies the address of a NSAP resource. NSAP records are used to map domain names to NSAP addresses. This record type is defined in RFC Public Key records KEY The KEY record specifies a public key that is associated with a DNS name. The key can be for a zone, a user, or a host. This record type is defined in RFC Responsible Person records RP The RP record specifies the internet mail address and description of the person responsible for this zone or host. This record type is defined in RFC Reverse-lookup Pointer records PTR The PTR record specifies the domain name of a host for which you want a PTR record defined. PTR records allow a host name lookup, given an IP address. This record type is defined in RFC Route Through records RT The RT record specifies a host domain name that can act as a forwarder of IP packets for this host. This record type is defined in RFC Services records SRV The SRV record specifies the hosts that support the defined services in the record. This record type is defined in RFC Domain Name System 11

18 Table 1. Resource record lookup table (continued) Resource record Abbreviation Description Start of Authority records SOA The SOA record specifies that this server is authoritative for this zone. An authoritative server is the best source for data within a zone. The SOA record contains general information about the zone and reload rules for secondary servers. There can be only one SOA record per zone. This record type is defined in RFC Text records TXT The TXT record specifies multiple strings of text, up to 255 characters long each, to be associated with a domain name. TXT records can be used along with responsible person (RP) records to provide information about who is responsible for a zone. This record type is defined in RFC TXT records are used by IBM i DHCP for dynamic updates. The DHCP server writes an associated TXT record for each PTR and an A record update that is done by the DHCP server. DHCP records have a prefix of AS400DHCP. Well-Known Services records WKS The WKS record specifies the well-known services supported by the object. Most commonly, WKS records indicate whether tcp or udp or both protocols are supported for this address. This record type is defined in RFC X.400 Address Mapping records PX The PX records is a pointer to X.400/RFC 822 mapping information. This record type is defined in RFC X25 Address Mapping records X25 The X25 record specifies the address of an X25 resource. This record maps a host name to the PSDN address. They are used only in X25 networks. This record type is defined in RFC System i: Networking Domain Name System

19 Related concepts: Mail and Mail Exchanger records Domain Name System (DNS) supports advanced mail routing through the use of Mail and Mail Exchanger (MX) records. Related reference: Example: Single Domain Name System server for an intranet on page 14 This example depicts a simple subnet with a Domain Name System (DNS) server for internal use. Understanding zones on page 2 Domain Name System (DNS) data is divided into manageable sets of data called zones. And each of these sets is a specific zone type. Mail and Mail Exchanger records Domain Name System (DNS) supports advanced mail routing through the use of Mail and Mail Exchanger (MX) records. Mail and MX records are used by mail routing programs, such as Simple Mail Transfer Protocol (SMTP). The lookup table in DNS resource records contains the types of mail records that IBM i DNS supports. DNS includes information for sending electronic mail by using mail exchanger information. If the network is using DNS, an SMTP application does not deliver mail addressed to host TEST.IBM.COM by opening a TCP connection to TEST.IBM.COM. SMTP first queries the DNS server to find out which host servers can be used to deliver the message. Deliver mail to a specific address DNS servers use resource records that are known as mail exchanger (MX) records. MX records map a domain or host name to a preference value and host name. MX records are generally used to designate that one host is used to process mail for another host. The records are also used to designate another host to deliver mail to, if the first host cannot be reached. In other words, they allow a mail that is addressed to one host to be delivered to a different host. Multiple MX resource records might exist for the same domain or host name. When multiple MX records exist for the same domain or host, the preference (or priority) value of each record determines the order in which they are tried. The lowest preference value corresponds to the most preferred record, which is tried first. When the most preferred host cannot be reached, the sending mail application tries to contact the next, less preferred MX host. The domain administrator, or the creator of the MX record, sets the preference value. A DNS server can respond with an empty list of MX resource records when the name is in the DNS server's authority but has no MX assigned to it. When this occurs, the sending mail application might try to establish a connection with the destination host directly. Note: Using a wildcard (example: *.mycompany.com) in MX records for a domain is not suggested. Example: MX record for a host In the following example, the system, by preference, delivers mail for fsc5.test.ibm.com to the host itself. If the host cannot be reached, the system might deliver the mail to psfred.test.ibm.com or to mvs.test.ibm.com (if psfred.test.ibm.com also cannot be reached). This is an example of what these MX records will look like: fsc5.test.ibm.com IN MX 0 fsc5.test.ibm.com IN MX 2 psfred.test.ibm.com IN MX 4 mvs.test.ibm.com Domain Name System 13

20 Related reference: Domain Name System resource records on page 9 Resource records are used to store data about domain names and IP addresses. You can use the Resource record lookup table to look into the resource records supported for the IBM i operating system. Examples: Domain Name System You can use these examples to understand how to use Domain Name System (DNS) in your network. DNS is a distributed database system for managing host names and their associated IP addresses. The following examples help to explain how DNS works, and how you can use it in your network. The examples describe the setup and reasons it will be used. They also link to related concepts that you might find useful to understand the pictures. Example: Single Domain Name System server for an intranet This example depicts a simple subnet with a Domain Name System (DNS) server for internal use. The following figure depicts DNS running on a System i platform for an internal network. This single DNS server instance is set up to listen for queries on all interface IP addresses. The system is a primary name server for the mycompany.com zone. 14 System i: Networking Domain Name System

21 Figure 2. Single DNS server for an intranet Each host in the zone has an IP address and a domain name. The administrator must manually define the hosts in the DNS zone data by creating resource records. Address mapping records (A for IPv4 or AAAA for IPv6) map the name of a machine to its associated IP address. This allows other hosts on the network to query the DNS server to find the IP address assigned to a particular host name. Reverse-lookup pointer (PTR) records map the IP address of a machine to its associated name. This allows other hosts on the network to query the DNS server to find the host name that corresponds to an IP address. In addition to A, AAAA, and PTR records, DNS supports many other resource records that might be required, depending on what other TCP/IP-based applications you are running on your intranet. For example, if you are running internal systems, you might need to add mail exchanger (MX) records so that SMTP can query DNS to find out which systems are running the mail servers. If this small network were part of a larger intranet, it might be necessary to define internal root servers. Domain Name System 15

22 Secondary servers Secondary servers load zone data from the authoritative server. Secondary servers obtain zone data by doing zone transfers from the authoritative server. When a secondary name server starts, it requests all data for the specified domain from the primary name server. A secondary name server requests updated data from the primary server either because it receives notification from the primary name server (if the NOTIFY function is being used) or because it queries the primary name server and determines that the data has changed. In the figure above, the mysystemi server is part of an intranet. Another system, mysystemi2, has been configured to act as a secondary DNS server for the mycompany.com zone. The secondary server can be used to balance the demand on servers and also to provide a backup in case the primary server goes down. It is a good practice to have at least one secondary server for every zone. Related reference: Domain Name System resource records on page 9 Resource records are used to store data about domain names and IP addresses. You can use the Resource record lookup table to look into the resource records supported for the IBM i operating system. Understanding zones on page 2 Domain Name System (DNS) data is divided into manageable sets of data called zones. And each of these sets is a specific zone type. Example: Single Domain Name System server with Internet access This example depicts a simple subnet with a Domain Name System (DNS) server connected directly to the Internet. Example: Single Domain Name System server with Internet access This example depicts a simple subnet with a Domain Name System (DNS) server connected directly to the Internet. The following figure depicts the same example network from the single DNS server for intranet example, but now the company has added a connection to the Internet. In this example, the company is able to access the Internet, but the firewall is configured to block Internet traffic into the network. 16 System i: Networking Domain Name System

23 Figure 3. Single DNS server with Internet access To resolve Internet addresses, you need to do at least one of the following tasks: v Define Internet root servers You can load the default Internet root servers automatically, but you might need to update the list. These servers can help to resolve addresses outside of your own zone. For instructions for obtaining the current Internet root servers, see Accessing external Domain Name System data. v Enable forwarding You can set up forwarding to pass queries for zones outside of mycompany.com to external DNS servers, such as DNS servers run by your Internet service provider (ISP). If you want to enable Domain Name System 17

24 searching by both forwarding and root servers, you need to set the forward option to first. The server first tries forwarding and then queries the root servers only if forwarding fails to resolve the query. The following configuration changes might also be required: v Assign unrestricted IP addresses In the example above, 10.x.x.x addresses are shown. However, these are restricted addresses and cannot be used outside of an intranet. They are shown below for example purposes, but your own IP addresses is determined by your ISP and other networking factors. v Register your domain name If you are visible to the Internet and have not already registered, you need to register a domain name. v Establish a firewall It is not suggested that you allow your DNS to be directly connected to the Internet. You need to configure a firewall or take other precautions to secure your System i platform. Related concepts: Domain Name System domain setup on page 5 Domain Name System (DNS) domain setup requires domain name registration to prevent others from using your domain name. System i and Internet security Understanding Domain Name System queries on page 3 Domain Name System (DNS) clients use DNS servers to resolve queries. The queries might come directly from the client or from an application running on the client. Related reference: Example: Single Domain Name System server for an intranet on page 14 This example depicts a simple subnet with a Domain Name System (DNS) server for internal use. Example: Domain Name System and Dynamic Host Configuration Protocol on the same System i This example depicts Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) on the same System i platform. The configuration can be used to update DNS zone data dynamically when DHCP assigns IP addresses to hosts. The following figure depicts a small subnet network with one System i platform that acts as a DHCP and DNS server to four clients. In this work environment, suppose that the inventory, data entry, and executive clients create documents with graphics from the graphics file server. They connect to the graphics file server by a network drive to its host name. 18 System i: Networking Domain Name System

25 Figure 4. DNS and DHCP on the same System i platform Previous versions of DHCP and DNS were independent of each other. If DHCP assigned a new IP address to a client, the DNS records had to be manually updated by the administrator. In this example, if the graphics file server's IP address changes because it is assigned by DHCP, then its dependent clients will be unable to map a network drive to its host name because the DNS records will contain the file server's previous IP address. With the IBM i DNS server based on BIND 9, you can configure your DNS zone to accept dynamic updates to DNS records in conjunction with intermittent address changes through DHCP. For example, when the graphics file server renews its lease and is assigned an IP address of by the DHCP server, the associated DNS records are updated dynamically. This allows the other clients to query the DNS server for the graphics file server by their host names without interruption. To configure a DNS zone to accept dynamic updates, complete the following tasks: v Identify the dynamic zone You cannot manually update a dynamic zone while the server is running. Doing so might cause interference with incoming dynamic updates. Manual updates can be made when the server is stopped, but you will lose any dynamic updates sent while the server is down. For this reason, you might want to configure a separate dynamic zone to minimize the need for manual updates. See Determining domain structure for more information about configuring your zones to use the dynamic update function. Domain Name System 19

26 v Configure the allow-update option Any zone with the allow-update option configured is considered a dynamic zone. The allow-update option is set on a per-zone basis. To accept dynamic updates, the allow-update option must be enabled for this zone. For this example, the mycompany.com zone has allow-update data, but other zones defined on the server can be configured to be static or dynamic. v Configure DHCP to send dynamic updates You must authorize your DHCP server to update the DNS records for the IP addresses it has distributed. v Configure secondary server update preferences To keep secondary servers current, you can configure DNS to use the NOTIFY function to send a message to secondary servers for the mycompany.com zone when zone data changes. You should also configure incremental zone transfers (IXFR), which enables IXFR-enabled secondary servers to track and load only the updated zone data, instead of the entire zone. If you run DNS and DHCP on different servers, there are some additional configuration requirements for the DHCP server. Related concepts: Dynamic updates on page 5 IBM i Domain Name System (DNS) that is based on BIND 9 supports dynamic updates. Outside sources, such as Dynamic Host Configuration Protocol (DHCP), can send updates to the DNS server. In addition, you can also use DNS client tools, such as Dynamic Update Utility (NSUPDATE), to perform dynamic updates. Related tasks: Configuring the DHCP to send dynamic updates to DNS Related reference: Example: DNS and DHCP on different System i platforms Example: Splitting DNS over firewall by setting up two DNS servers on the same System i This example depicts a Domain Name System (DNS) server that operates over a firewall to protect internal data from the Internet, while allowing internal users to access data on the Internet. This configuration accomplishes this protection by setting up two DNS servers on the same System i platform. The following figure depicts a simple subnet network that uses a firewall for security. Suppose that the company has an internal network with reserved IP space and an external section of a network that is available to the public. The company wants its internal clients to be able to resolve external host names and to exchange mail with people on the outside. The company also wants its internal resolvers to have access to certain internal-only zones that are not available at all outside of the internal network. However, they do not want any outside resolvers to be able to access the internal network. With IBM i DNS based on BIND 9, you can use two ways to accomplish this. The first way is that the company sets up two DNS server instances on the same System i platform, one for the intranet and another for everything in its public domain, which is described in this example. Another way is to use the view function that is provided in BIND 9, which is described in the example about splitting DNS over firewall by using a view. 20 System i: Networking Domain Name System

27 Figure 5. Splitting DNS over a firewall by setting up two DNS servers on the same System i The external server, DNSB, is configured with the primary zone mycompany.com. This zone data includes only the resource records that are intended to be part of the public domain. The internal server, DNSA, is configured with the primary zone mycompany.com, but the zone data defined on DNSA contains intranet resource records. The forwarder option is defined as This forces DNSA to forward queries it cannot resolve to the DNSB server. If you are concerned about the integrity of your firewall or other security threats, you have the option of using the listen-on option to help protect internal data. To do this, you can configure the internal server to only allow queries to the internal mycompany.com zone from internal hosts. In order for all this to Domain Name System 21

28 work correctly, internal clients need to be configured to query only the DNSA server. You need to consider the following configuration settings to split DNS: v Listen-on In other DNS examples, only one DNS server is on a System i platform. It is set to listen on all interface IP addresses. Whenever you have multiple DNS servers on a System i platform, you must define the interface IP addresses that each one listens on. Two DNS servers cannot listen on the same address. In this case, assume that all queries that come in from the firewall are sent in on These queries should be sent to the external server. Therefore, DNSB is configured to listen on The internal server, DNSA, is configured to accept queries from anything on the 10.1.x.x interface IP addresses except To effectively exclude this address, the address match list must have the excluded address listed before the included address prefix. v Address match list order The first element in the address match list that a given address matches is used. For example, to allow all addresses on the 10.1.x.x network except , the ACL elements must be in the order (! ; 10.1/16). In this case, the address is compared to the first element and is immediately denied. If the elements are reversed (10.1/16;! ), the IP address is allowed access because the server compares it to the first element that matches, and allows it without checking the rest of the rules. Related reference: BIND 9 features on page 7 BIND 9 is similar to BIND 8; however, it provides several features to enhance performance of your Domain Name System (DNS) server, such as views. Example: Splitting DNS over firewall by using view This example depicts a Domain Name System (DNS) server that operates over a firewall to protect internal data from the Internet, while allowing internal users to access data on the Internet by using the view feature that BIND 9 provides. Example: Splitting DNS over firewall by using view This example depicts a Domain Name System (DNS) server that operates over a firewall to protect internal data from the Internet, while allowing internal users to access data on the Internet by using the view feature that BIND 9 provides. The following figure depicts a simple subnet network that uses a firewall for security. Suppose that the company has an internal network with reserved IP space and an external section of a network that is available to the public. The company wants its internal clients to be able to resolve external host names and to exchange mail with people outside the network. The company also wants its internal resolvers to have access to certain internal-only zones that are not available outside of the internal network. However, the company does not want any outside resolvers to be able to access the internal network. With IBM i DNS based on BIND 9, you can use two ways to accomplish this. The way described in this example is that you can configure the DNS server with two different views to listen on various queries, one for the intranet and another for everything in its public domain. Another way is to set up two DNS server instances on the same System i platform, which is described in the example about splitting DNS over a firewall by using two DNS servers. 22 System i: Networking Domain Name System

29 Figure 6. Splitting DNS over a firewall by using view The DNS server, DNSC, defines two views, called external and internal. The external view is configured with a primary zone mycompany.com that includes only the resource records that are intended to be part of the public domain, while the internal view is configured with a primary zone mycompany.com that contains intranet resource records. If you are concerned about the integrity of your firewall or other security threats, you have the option of using the match-clients substatement to help protect internal data. To do this, you can configure the internal view to only allow queries to the internal mycompany.com zone from internal hosts. You need to consider the following configuration settings to set up split DNS: v Match-clients Domain Name System 23

30 The match-clients in a view statement takes an address match list as an argument. Only a query's IP address that matches the address match list can see the configuration values defined in the enclosing view. If a query's IP address matches multiple match-clients entries in various view statements, the first view statement is the one that applies. In this case, assume that all queries that come from the firewall are sent in These queries should be handled by the zone data in the external view. Therefore, is set to be the match-clients of the external view. The internal view is configured to accept queries from anything on the 10.1.x.x interface IP addresses except To effectively exclude this address, the address match list must have the excluded address listed before the included address prefix. v Address match list order The first element in the address match list that a given address matches is used. For example, to allow all addresses on the 10.1.x.x network except , the ACL elements must be in the order (! ; 10.1/16). In this case, the address is compared to the first element and is immediately denied. If the elements are reversed (10.1/16;! ), the IP address is allowed access because the server compares it to the first element that matches, and allow it without checking the rest of the rules. Related reference: Example: Splitting DNS over firewall by setting up two DNS servers on the same System i on page 20 This example depicts a Domain Name System (DNS) server that operates over a firewall to protect internal data from the Internet, while allowing internal users to access data on the Internet. This configuration accomplishes this protection by setting up two DNS servers on the same System i platform. Planning for Domain Name System Domain Name System (DNS) offers a variety of solutions. Before you configure DNS, it is important to plan how it works within your network. Subjects, such as network structure, performance, and security, should be assessed. Determining Domain Name System authorities There are special authorization requirements for the Domain Name System (DNS) administrator. You should also consider security implications of authorization. When you set up DNS, you should take security precautions to protect your configuration. You need to establish which users are authorized to make changes to the configuration. A minimum level of authority is required to allow your administrator to configure and administer DNS. Granting all object access ensures that the administrator is capable of performing DNS administrative tasks. It is suggested that users who configure DNS have security officer access with all object (*ALLOBJ) authority. Use System i Navigator to authorize users. If you need more information, refer to the Granting authority to the DNS administrator topic in the DNS online help. Note: If an administrator's profile does not have full authority, specific access and authority to all DNS directories and related configuration files must be granted. Related reference: Maintaining Domain Name System configuration files on page 34 You can use IBM i DNS to create and manage DNS server instances on your System i platform. The configuration files for DNS are managed by System i Navigator. You must not manually edit the files. Always use System i Navigator to create, change, or delete DNS configuration files. Determining domain structure If you are setting up a domain for the first time, you should plan for demand and maintenance before creating zones. 24 System i: Networking Domain Name System

31 It is important to determine how you divide your domain or subdomains into zones, how to best serve network demand, access to the Internet, and how to negotiate firewalls. These factors can be complex and must be dealt with case-by-case. Refer to authoritative sources such as the O'Reilly DNS and BIND book for in-depth guidelines. If you configure a Domain Name System (DNS) zone as a dynamic zone, you cannot make manual changes to zone data while the server is running. Doing so might cause interference with incoming dynamic updates. If it is necessary to make manual updates, stop the server, make the changes, and then restart the server. Dynamic updates sent to a stopped DNS server will never be completed. For this reason, you might want to configure a dynamic zone and a static zone separately. You can do this by creating entirely separate zones, or by defining a new subdomain, such as dynamic.mycompany.com, for those clients that will be maintained dynamically. IBM i DNS provides a graphical interface for configuring your systems. In some cases, the interface uses terminology or concepts that might be represented differently in other sources. If you refer to other information sources when you are planning for your DNS configuration, it might be helpful to remember the following items: v All zones and objects defined on a System i platform are organized within the folders Forward Lookup Zones and Reverse Lookup Zones. Forward lookup zones are the zones that are used to map domain names to IP addresses, such as A and AAAA records. The reverse lookup zones are the zones that are used to map IP addresses to domain names, such as PTR records. v IBM i DNS refers to primary zones and secondary zones. v The interface uses subzones, which some sources refer to as subdomains. A child zone is a subzone for which you have delegated responsibility to one or more name servers. Planning security measures Domain Name System (DNS) provides security options to limit outside access to your server. Address match lists DNS uses address match lists to allow or deny outside entities access to certain DNS functions. These lists can include specific IP addresses, a subnet (using an IP prefix), or using Transaction Signature (TSIG) keys. You can define a list of entities to which you want to allow or deny access in an address match list. If you want to be able to reuse an address match list, you can save the list as an access control list (ACL). Then whenever you need to provide the list, you can call the ACL and the entire list will be loaded. Address match list item order The first item in an address match list that a given address matches is used. For example, to allow all addresses on the x network except , the match list items must be in the order (! ; /24). In this case, the address will be compared to the first item and will immediately be denied. If the elements are reversed (10.1.1/24;! ), the IP address will be allowed access because the server will compare it to the first item, which matches, and allow it without checking the rest of the rules. Access control options DNS allows you to set limitations such as who can send dynamic updates to the server, query data, and request zone transfers. You can use ACLs to restrict access to the server for the following options: allow-update In order for your DNS server to accept dynamic updates from any outside sources, you must enable the allow-update option. Domain Name System 25

32 allow-query Specifies which hosts are allowed to query this server. If not specified, the default is to allow queries from all hosts. allow-transfer Specifies which hosts are allowed to receive zone transfers from the server. If not specified, the default is to allow transfers from all hosts. allow-recursion Specifies which hosts are allowed to make recursive queries through this server. If not specified, the default is to allow recursive queries from all hosts. blackhole Specifies a list of addresses that the server does not accept queries from or use to resolve a query. Queries from these addresses will not be responded to. Securing your DNS server is essential. In addition to the security considerations in this topic, DNS security and System i security are covered in a variety of sources including the System i platform and the Internet topic collection. The book DNS and BIND also covers security related to DNS. Related concepts: System i and Internet security Related reference: BIND 9 features on page 7 BIND 9 is similar to BIND 8; however, it provides several features to enhance performance of your Domain Name System (DNS) server, such as views. Domain Name System requirements Consider these software requirements to run Domain Name System (DNS) on your System i platform. The DNS feature, Option 31, cannot be installed automatically with the operating system. You must specifically select DNS for installation. The DNS server added for IBM i is based on the industry-standard DNS implementation known as BIND 9. Previous OS/400 DNS services were based on BIND 8.2.5, and are still available in IBM i. After DNS is installed, you are required to migrate and configure the DNS server from BIND 4 or 8 to BIND 9. You must also have IBM i PASE installed, which is Option 33 of IBM i. After IBM i PASE is installed, System i Navigator automatically handles configuring the current BIND implementation. If you want to configure a Dynamic Host Configuration Protocol (DHCP) server on a different platform to send updates to this DNS server, Option 31 must be installed on that DHCP server as well. The DHCP server uses programming interfaces provided by Option 31 to perform dynamic updates. Related concepts: i5/os PASE Configuring Domain Name System on page 27 You can use System i Navigator to configure name servers and to resolve queries outside of your domain. Related reference: BIND 9 features on page 7 BIND 9 is similar to BIND 8; however, it provides several features to enhance performance of your Domain Name System (DNS) server, such as views. Determining if Domain Name System is installed To determine if Domain Name System (DNS) is installed, follow these steps. 1. At the command line, type GO LICPGM and press Enter. 26 System i: Networking Domain Name System

33 2. Type 10 (Display installed licensed programs) and press Enter. 3. Page down to 5761SS1 Domain Name System (Option 31). If DNS is installed successfully, the Installed Status is *COMPATIBLE, as shown here: LicPgm Installed Status Description 5761SS1 *COMPATIBLE Domain Name System 4. Press F3 to exit the display. Installing Domain Name System To install Domain Name System (DNS), follow these steps. 1. At the command line, type GO LICPGM and press Enter. 2. Type 11 (Install licensed programs) and press Enter. 3. Type 1 (Install) in the Option field next to Domain Name System and press Enter. 4. Press Enter again to confirm the installation. Configuring Domain Name System You can use System i Navigator to configure name servers and to resolve queries outside of your domain. Before you work with your Domain Name System (DNS) configuration, see DNS system requirements to install the necessary DNS components. Related concepts: Domain Name System requirements on page 26 Consider these software requirements to run Domain Name System (DNS) on your System i platform. Accessing Domain Name System in System i Navigator These instructions guide you to the DNS configuration interface in System i Navigator. If you are using IBM i PASE, you will be able to configure DNS servers based on BIND 9. If you are configuring DNS for the first time, follow these steps: 1. In System i Navigator, expand your system > Network > Servers > DNS. 2. Right-click DNS and select New Configuration. Related concepts: Getting to know System i Navigator Configuring name servers Domain Name System (DNS) allows you to create multiple name server instances. This topic provides instructions for configuring a name server. IBM i DNS based on BIND 9 supports multiple name server instances. The following tasks guide you through the process of creating a single name server instance, including its properties and zones. If you want to create multiple instances, repeat these procedures until all instances you want have been created. You can specify independent properties, such as debug levels and autostart values, for each name server instance. When you create a new instance, separate configuration files are created. Domain Name System 27

34 Related reference: Maintaining Domain Name System configuration files on page 34 You can use IBM i DNS to create and manage DNS server instances on your System i platform. The configuration files for DNS are managed by System i Navigator. You must not manually edit the files. Always use System i Navigator to create, change, or delete DNS configuration files. Creating a name server instance The New Domain Name System (DNS) Configuration wizard can guide you through the process of defining a DNS server instance. To start the New DNS Configuration wizard, follow these steps: 1. In System i Navigator, expand your system > Network > Servers > DNS. 2. In the left pane, right-click DNS and select New Name Server. 3. Follow the wizard's instructions to complete the configuration process. The wizard requires the following input: DNS server name: Specify a name for your DNS server. It can be up to 5 characters long and must begin with an alphabetic character (A-Z). If you create multiple servers, each must have a unique name. This name is referred to as the DNS server instance name in other areas of the system. Listen-on IP addresses: Two DNS servers cannot listen on the same IP address. The default setting is to listen on all IP addresses. If you are creating additional server instances, they cannot be configured to listen on all IP addresses. Otherwise, they cannot be run at the same time. You must specify the IP addresses for each server. Root servers: You might load the list of default Internet root servers or specify your own root servers, such as internal root servers for an intranet. Note: You should only consider loading the default Internet root servers if you have access to the Internet and expect your DNS to be able to fully resolve Internet names. Server startup: You can specify whether the server should autostart when TCP/IP is started. When you operate multiple servers, individual instances can be started and ended independently of each other. Editing Domain Name System server properties After you create a name server, you can edit properties such as allow-update and debug levels. These options apply only to the server instance you change. To edit the properties of the Domain Name System (DNS) server instance, follow these steps: 1. In System i Navigator, expand your system > Network > Servers > DNS. 2. In the right pane, right-click your DNS server and select Configuration. 3. In the DNS Configuration window, right-click DNS Server and select Properties. 4. Edit the corresponding properties you'd like to. Configuring zones on a name server After you configure a Domain Name System (DNS) server instance, you need to configure the zones for the name server. To configure zones on your server, follow these steps: 1. In System i Navigator, expand your system > Network > Servers > DNS. 2. In the right pane, right-click your DNS server and select Configuration. 28 System i: Networking Domain Name System

35 3. In the DNS Configuration window, select the zone type that you want to create by right-clicking either the Forward Lookup Zone or the Reverse Lookup Zone folder. 4. Follow the wizard s instructions to complete the creation process. Related concepts: Accessing external Domain Name System data on page 30 When you create Domain Name System (DNS) zone data, your server will be able to resolve queries to that zone. Related tasks: Configuring Domain Name System to receive dynamic updates Domain Name System (DNS) servers running BIND 9 can be configured to accept requests from other sources to update zone data dynamically. This topic provides instructions for configuring the allow-update option so DNS can receive dynamic updates. Importing Domain Name System files on page 30 Domain Name System (DNS) can import existing zone data files. Follow these time-saving procedures for creating a new zone from an existing configuration file. Related reference: Understanding zones on page 2 Domain Name System (DNS) data is divided into manageable sets of data called zones. And each of these sets is a specific zone type. Configuring views on a name server One of the features that BIND 9 offers is the view statement, which allows a single Domain Name System (DNS) instance to answer a query differently depending on where the query is coming from, such as the Internet or an intranet. One practical application of view is to split DNS setups without having to run multiple DNS servers. To configure views on your server, follow these steps: 1. In System i Navigator, expand your system > Network > Servers > DNS. 2. In the right pane, right-click your DNS server and select Configuration. 3. In the DNS Configuration window, right-click Views and select New View. 4. Follow the wizard s instructions to complete the creation process. Configuring Domain Name System to receive dynamic updates Domain Name System (DNS) servers running BIND 9 can be configured to accept requests from other sources to update zone data dynamically. This topic provides instructions for configuring the allow-update option so DNS can receive dynamic updates. When creating dynamic zones, you should consider your network structure. If parts of your domain still requires manual updates, you might want to consider setting up separate static and dynamic zones. If you need to make manual updates to a dynamic zone, you must stop the dynamic zone server and restart it after you have completed the updates. Stopping the server forces it to update the zone database with all dynamic updates that have been made since the server first loaded its zone data from the zone database. If you do not stop the server, you will lose any manual updates to the zone database because they will be overwritten by the running server. However, stopping the server to make manual updates means you might miss dynamic updates that are sent while the server is down. DNS indicates that a zone is dynamic when objects are defined in the allow-update statement. To configure the allow-update option, follow these steps: 1. In System i Navigator, expand your system > Network > Servers > DNS. 2. In the right pane, right-click your DNS server and select Configuration. 3. In the DNS Configuration window, expand Forward Lookup Zone or Reverse Lookup Zone. 4. Right-click the primary zone that you want to edit and select Properties. Domain Name System 29

36 5. In the Primary Zone Properties page, click the Options tab. 6. On the Options page, expand Access Control > allow-update. 7. DNS uses an address match list to verify authorized updates. To add an object to the address match list, select an address match list item type and click Add. You can add an IP Address, IP Prefix, Access Control List, or Key. 8. When you have finished updating the address match list, click OK to close the Options page. Related tasks: Configuring zones on a name server on page 28 After you configure a Domain Name System (DNS) server instance, you need to configure the zones for the name server. Configuring the DHCP to send dynamic updates to DNS Importing Domain Name System files Domain Name System (DNS) can import existing zone data files. Follow these time-saving procedures for creating a new zone from an existing configuration file. You can create a primary zone by importing a zone data file that is a valid zone configuration file based on BIND syntax. The file should be located in an Integrated file system directory. When imported, DNS verifies that it is a valid zone data file and adds it to the named.conf file for the specified server instance. To import a zone file, follow these steps: 1. In System i Navigator, expand your system > Network > Servers > DNS. 2. In the right pane, double-click the DNS server instance into which you want to import the zone. 3. In the left pane of the DNS Configuration window, right-click DNS server and select Import Zone. 4. Follow the wizard's instructions to import the primary zone. Related tasks: Configuring zones on a name server on page 28 After you configure a Domain Name System (DNS) server instance, you need to configure the zones for the name server. Record validation The Import domain data function reads and validates each record of the file that is being imported. After the Import domain data function has finished, any records in error can be examined individually on the Other Records property page of the imported zone. Notes: 1. Importing a large primary domain might take several minutes. 2. The import domain data function does not support the $include directive. Import domain data's validity checking process identifies lines that contain the $include directive as lines in error. Accessing external Domain Name System data When you create Domain Name System (DNS) zone data, your server will be able to resolve queries to that zone. Root servers are critical to the function of a DNS server that is directly connected to the Internet or a large intranet. DNS servers must use root servers to answer queries about hosts other than those that are contained in their own domain files. 30 System i: Networking Domain Name System

37 To reach out for more information, a DNS server has to know where to look. On the Internet, the first place that a DNS server looks is the root servers. The root servers direct a DNS server toward other servers in the hierarchy until an answer is found, or it is determined that there is no answer. The default root servers list for System i Navigator You should use Internet root servers only if you have an Internet connection and you want to resolve names on the Internet if they are not resolved on your DNS server. A default list of Internet root servers is supplied in System i Navigator. The list is current when System i Navigator is released. You can verify that the default list is current by comparing it to the list on the InterNIC site. Update your configuration's root server list to keep it current. Getting Internet root server addresses The top-level root server's addresses change from time to time, and it is the DNS administrator's responsibility to keep them current. InterNIC maintains a current list of Internet root server addresses. To obtain a current list of Internet root servers, follow these steps: 1. Log on the InterNIC server by using File Transfer Protocol (FTP) in the anonymity method: FTP.INTERNIC.NET or RS.INTERNIC.NET 2. Download this file: /domain/named.root 3. Store the file in the following directory path: /QOpenSys/QIBM/ProdData/OS400/DNS/ROOT.FILE A DNS server behind a firewall might have no root servers defined. In this case, the DNS server can resolve queries only from entries that exist in its own primary domain database files, or its cache. It might forward off-site queries to the firewall DNS. In this case, the firewall DNS server acts as a forwarder. Intranet root servers If your DNS server is part of a large intranet, you might have internal root servers. If your DNS server will not be accessing the Internet, you do not need to load the default Internet servers. However, you should add your internal root servers so that your DNS server can resolve internal addresses outside of its domain. Related tasks: Configuring zones on a name server on page 28 After you configure a Domain Name System (DNS) server instance, you need to configure the zones for the name server. Managing Domain Name System Managing a Domain Name System (DNS) server includes verifying that the DNS function is working, monitoring performance, and maintaining DNS data and files. Verifying the Domain Name System function is working The domain information groper (DIG) tool can help you collect information from and test response of a Domain Name System (DNS) server. You can use DIG to verify if a DNS server is working correctly. Request the host name that is associated with the loopback IP address ( ). It should respond with the host name (localhost). You can also query specific names that are defined in the server instance that you are trying to verify. This confirms that the specific server instance you are testing is functioning correctly. To verify DNS function with DIG, follow these steps: 1. At the command line, type DIG HOSTNAME(' ') REVERSE(*YES). Domain Name System 31

38 This information should display, including the loopback host name: ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id:865 ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL:1 ;; QUESTION SECTION: ; in-addr.arpa. IN PTR ;; ANSWER SECTION: in-addr.arpa IN PTR localhost. ;; AUTHORITY SECTION: in-addr.arpa IN NS ISA2LP05.RCHLAND.IBM.COM. ;; ADDITIONAL SECTION: ISA2LP05.RCHLAND.IBM.COM IN A ;; Query time: 552 msec ;; SERVER: #53( ) ;; WHEN: Thu May 31 21:38: ;; MSG SIZE rcvd: 117 The DNS server is responding correctly if it returns the loopback host name: localhost. 2. Press Enter to quit the session. Note: If you need help using DIG, type?dig and press Enter. Managing security keys Security keys allow you to limit access to your Domain Name System (DNS) data. There are two types of keys related to DNS, which are DNS keys and dynamic update keys. They each play a different role in securing your DNS configuration. The following descriptions explain how each relates to your DNS server. Managing Domain Name System keys The Domain Name System (DNS) keys are keys defined for BIND and used by the DNS server as part of the verification of an incoming update. You can configure a key and assign it a name. Then, when you want to protect a DNS object, such as a dynamic zone, you can specify the key in the Address Match List. To manage DNS keys, follow these steps: 1. In System i Navigator, expand your system > Network > Servers > DNS. 2. In the right pane, right-click the DNS server instance that you want to manage and select Configuration. 3. In the DNS Configuration window, select File > Manage Keys. In the Manage Keys window, you can perform the corresponding management tasks. Managing dynamic update keys Dynamic update keys are used for securing dynamic updates by the Dynamic Host Configuration Protocol (DHCP) server. These keys must be present when Domain Name System (DNS) and DHCP are on the same System i platform. If DHCP is on a different System i platform, you must distribute the same dynamic update key files to each remote System i platform that needs them to send dynamic updates to the authoritative servers. You can distribute them through FTP, , and so forth. 32 System i: Networking Domain Name System

39 To manage dynamic update keys, follow these steps: 1. In System i Navigator, expand your system > Network > Servers > DNS. 2. Right-click DNS and select Manage Dynamic Update Keys. You can then perform the corresponding management tasks in the Manage Dynamic Update Keys window. Accessing Domain Name System server statistics Database dump and statistics tools can help you review and manage server performance. Domain Name System (DNS) provides several diagnostic tools. They can be used to monitor performance of your server. Related reference: Maintaining Domain Name System configuration files on page 34 You can use IBM i DNS to create and manage DNS server instances on your System i platform. The configuration files for DNS are managed by System i Navigator. You must not manually edit the files. Always use System i Navigator to create, change, or delete DNS configuration files. Accessing server statistics The server statistics summarize the number of queries and responses the server received since the last time the server restarted or reloaded its database. Domain Name System (DNS) allows you to view the statistics for a server instance. Information is continually appended to this file until you delete the file. This information might be useful in evaluating how much traffic the server receives, and in tracking down problems. More information about server statistics is available in the DNS online help topic Understanding DNS server statistics. To access server statistics, follow these steps: 1. In System i Navigator, expand your system > Network > Servers > DNS. 2. In the right pane, right-click your DNS server and select Configuration. 3. In the DNS configuration window, select View > Server Statistics. You can also use the Remote Name Daemon Control (RNDC) command to display the server statistics information in the named.stats file. The corresponding command is as follows. RNDC RNDCCMD( stats ) Accessing an active server database The active server database contains zone and host information, including some zone properties, such as start of authority (SOA) information, and through host properties, such as mail exchanger (MX) information, which might be useful in tracking down problems. Domain Name System (DNS) allows you to view a dump of the authoritative data, cache data, and hints data for a server instance. The dump includes the information from all of the server's primary and secondary zones (forward and reverse mapping zones), as well as information that the server has obtained from queries. You can view the active server database dump using System i Navigator. If you need to save a copy of the files, the database dump file name is named_dump.db in your IBM i directory path: /QIBM/UserData/OS400/DNS/<server instance>/, where <server instance> is the name of the DNS server instance. More information about the active server database is available in the DNS online help topic Understanding the DNS server database dump. To access the active server database dump, follow these steps: Domain Name System 33

40 1. In System i Navigator, expand your system > Network > Servers > DNS. 2. In the right pane, right-click your DNS server and select Configuration. 3. In the DNS configuration window, select View > Active Server Database. You can also use the Remote Name Daemon Control (RNDC) command to display the active server database information in the named_dump.db file. The corresponding command is as follows. RNDC RNDCCMD( dumpdb -all ) Maintaining Domain Name System configuration files You can use IBM i DNS to create and manage DNS server instances on your System i platform. The configuration files for DNS are managed by System i Navigator. You must not manually edit the files. Always use System i Navigator to create, change, or delete DNS configuration files. DNS configuration files are stored in the integrated file system paths listed below. Note: The file structure below applies to DNS running on BIND 9. In the following table, files are listed in the hierarchy of paths shown. Files with a save icon should be backed up to protect data. Files with a delete icon should be deleted on a regular basis. Name Icon Description /QIBM/UserData/OS400/DNS/ /QIBM/UserData/OS400/DNS/ <instance-n>/ ATTRIBUTES BOOT.AS400BIND4 named.ca named.conf named_dump.db named.memstats Starting point directory for DNS. Starting point directory for a DNS instance. DNS uses this file to determine which BIND version you are using. BIND server configuration and policies file that is converted to the BIND 8 named.conf file for this instance. This file is created if you migrate a BIND server to BIND 9. It serves as a backup for migration, and can be deleted when the BIND 9 server is working properly. List of root servers for this server instance. This file contains configuration data. It tells the server what specific zones it is managing, where the zone files are, which zones can be dynamically updated, where its forwarding servers are, and other option settings. Server data dump created for the active server database. Server memory statistics (if configured in named.conf). 34 System i: Networking Domain Name System

41 Name Icon Description named.pid Holds Process ID of running server. This file is created each time the DNS server is started. It is used for the Database, Statistics, and Update server functions. Do not delete or edit this file. named.random Server generated entropy file. named.recursing Servers queries that are recursive (if requested by System i Navigator). named.run Default debug log (if requested). It can roll over as named.run.0, named.run.1, and so on. named.stats Server statistics. <primary-zone-n>.db <primary-zone-n>.jnl db.<secondary-zone-n> /QIBM/UserData/OS400/DNS/_DYN/ <key_id-n>._key <key_id-x>._duk. <zone-a> <key_id-x>._kid <key_id-y>._duk. <zone-a> It is the primary zone file for a particular domain on this server. The file contains all of the resource records for this zone. Each zone has a separate.db file. Journal file that holds dynamic updates for a zone. It is created when the first dynamic update is received. When a server is restarted after a shutdown or crash, it replays the journal file to incorporate into the zone any updates that took place after the last zone dump. This file is also used for incremental zone transfers (IXFR). These log files do not disappear. This is a binary file and should not be edited. Secondary zone file for a particular domain on this server. Contains all of the resource records for this zone. This file is used to initially load the secondary server at startup if the primary server is unreachable. Each zone has a separate.db file. Directory that holds files required for dynamic updates..symlink to DNSSEC key with the <key_id-n> key. It always points to the last K<key_id-n>.+aaa+nnnnn.key key that is created. Dynamic update key required to initiate a dynamic update request to <zone-a> using the <key_id-x> key. File containing a key statement for the key_id named <key_id-x> Dynamic update key required to initiate a dynamic update request to <zone-a> using the <key_id-y> key. Domain Name System 35

42 Name Icon Description <key_id-y>._duk. <zone-b> <key_id-y>._kid rndc-confgen.random.nnnnnn Dynamic update key required to initiate a dynamic update request to <zone-b> using the <key_id-y> key. File containing a key statement for the key_id named <key_id-y> Entropy files for various commands that require them. The nnnnn part is the job number of the job that created the file. These are only left behind if the command cancels for some reason and does not clean up. Related concepts: Determining Domain Name System authorities on page 24 There are special authorization requirements for the Domain Name System (DNS) administrator. You should also consider security implications of authorization. Accessing Domain Name System server statistics on page 33 Database dump and statistics tools can help you review and manage server performance. Related tasks: Configuring name servers on page 27 Domain Name System (DNS) allows you to create multiple name server instances. This topic provides instructions for configuring a name server. Advanced Domain Name System features This topic explains how experienced administrators can use Domain Name System (DNS) advanced features to manage a DNS server more easily. DNS in System i Navigator provides an interface with advanced features for configuring and managing your DNS server. The following tasks are provided as shortcuts for administrators who are familiar with the IBM i graphical interface. They provide fast methods for changing server status and attributes for multiple instances simultaneously. Related tasks: Changing Domain Name System debug settings on page 40 The Domain Name System (DNS) debug function can provide information that can help you determine and correct DNS server problems. Starting or stopping Domain Name System servers If Domain Name System (DNS) in the System i Navigator interface does not allow you to start or stop multiple server instances simultaneously, you can use the character-based interface to change these settings for multiple instances simultaneously. To use the character-based interface to start all DNS server instances at once, type STRTCPSVR SERVER(*DNS) DNSSVR(*ALL) at the command line. To stop all DNS servers at once, type ENDTCPSVR SERVER(*DNS) DNSSVR(*ALL) at the command line. Changing debug values It is useful to change the debug level for administrators who have large zones and do not want the large amount of debug data collected when the server is first starting up and loading all of the zone data. Domain Name System (DNS) in the System i Navigator interface does not allow you to change the debug level while the server is running. However, you can use the character-based interface to change the debug 36 System i: Networking Domain Name System

43 level while the server is running. To change the debug level using the character-based interface, follow these steps, replacing nnnnn in the command with the name of the server instance: 1. At the command line, type ADDLIBLE QDNS and press Enter. 2. Change the debug level: v To turn debugging on or to increase the debug level by 1, type RNDC RNDCCMD( trace ) and press Enter. v To turn debugging off, type RNDC RNDCCMD( notrace ) and press Enter. Troubleshooting Domain Name System Domain Name System (DNS) logging and debugging settings can help you resolve problems with your DNS server. DNS operates much the same as other TCP/IP functions and applications. Like SMTP or FTP applications, DNS jobs run under the QSYSWRK subsystem and produce job logs under the user profile QTCP with information associated with the DNS job. If a DNS job ends, you can use the job logs to determine the cause. If the DNS server is not returning the expected responses, the job logs might contain information that can help with problem analysis. The DNS configuration consists of several files with several different types of records in each file. Problems with the DNS server are generally the result of incorrect entries in the DNS configuration files. When a problem occurs, verify that the DNS configuration files contain the entries you expect. Identifying jobs If you look in the job log to verify DNS server function (using WRKACTJOB, for example), consider the following naming guidelines: v If you are running servers based on BIND 9, there will be a separate job for each server instance you are running. The job name is five fixed chars (QTOBD) followed by the instance name. For example, if you have two instances, INST1 and INST2, their job names will be QTOBDINST1 and QTOBDINST2. Logging Domain Name System server messages Domain Name System (DNS) provides numerous logging options that can be adjusted when you are trying to find the source of a problem. Logging provides flexibility by offering various severity levels, message categories, and output files so that you can fine-tune logging to help you find problems. BIND 9 offers several logging options. You can specify what types of messages are logged, where each message type is sent, and what severity of each message type to log. In general, the default logging settings are suitable, but if you want to change them, it is suggested that you refer to other sources of BIND 9 documentation for information about logging. Logging channels The DNS server can log messages to different output channels. Channels specify where logging data is sent. You can select the following channel types: v File channels Messages logged to file channels are sent to a file. The default file channels are i5os_debug and i5os_qprint. By default, debug messages are logged to the i5os_debug channel, which is the named.run file, but you can specify to send other message categories to this file as well. Message categories logged to i5os_qprint are sent to a QPRINT spooled file for user profile QTCP. You can create your own file channels in addition to the default channels provided. v Syslog channels Domain Name System 37

44 Messages logged to this channel are sent to the server's job log. The default syslog channel is i5os_joblog. Logging messages routed to this channel are sent to the job log of the DNS server instance. v Null channels All messages logged to the null channel are discarded. The default null channel is i5os_null. You can route categories to the null channel if you do not want the messages to appear in any log file. Message categories Messages are grouped into categories. You can specify what message categories should be logged to each channel. The categories are as follows: client Processing of client requests. config Configuration file parsing and processing. database Messages relating to the databases that are used internally by the DNS server to store zone and cache data. default Definitions of the logging options for those categories where no specific configuration has been defined. delegation-only Delegation only. It logs queries that have been forced to NXDOMAIN as the result of a delegation-only zone or a delegation-only in a hint or stub zone declaration. dispatch Dispatching of incoming packets to the server modules where they are to be processed. dnssec DNS Security Extensions (DNSSEC) and Transaction Signature (TSIG) protocol processing. general The catch-all category that is used for those things that are not classified into any other categories. lame-servers Lame servers that are misconfigurations in remote servers, discovered by BIND 9 when trying to query those servers during resolution. network Network operations. notify The NOTIFY protocol. resolver DNS resolution, such as the recursive lookups, that is performed on behalf of clients by a caching name server. security Approval and denial of requests. xfer-in Zone transfers that the server is receiving. xfer-out Zone transfers that the server is sending. unmatched Messages that are named was unable to determine the class of or for which there was no matching view. A one-line summary is also logged to the client category. This category is best sent to a file or stderr. By default, it is sent to the null channel. 38 System i: Networking Domain Name System

45 update Dynamic updates. update-security Approval and denial of update requests. Queries specify where queries should be logged. At startup, specifying the category queries enables query logging unless the querylog option is specified. The query log entry reports the client s IP address and port number, the query name, class, and type. It also reports whether the Recursion Desired flag was set (+ if set, - if not set), EDNS was in use (E), or if the query was signed (S). Log files can become large and can be deleted on a regular basis. All contents in the DNS log file are cleared when the DNS server is stopped and started. Message severity Channels allow you to filter by message severity. For each channel, you can specify the severity level for which messages are logged. The following severity levels are available: v Critical v Error v Warning v Notice v Info v Debug (specify debug level 0-11) v Dynamic (inherit the server startup debug level) All messages of the severity you select and any levels above it in the list are logged. For example, if you select Warning, the channel logs Warning, Error, and Critical messages. If you select Debug level, you can specify a value from 0 to 11 for which you want debug messages to be logged. Changing logging settings To access logging options, follow these steps: 1. In System i Navigator, expand your system > Network > Servers > DNS. 2. In the right pane, right-click your DNS server and select Configuration. 3. In the DNS configuration window, right-click DNS server and select Properties. 4. In the Server Properties window, select the Channels tab to create new file channels or properties of a channel, such as the severity of messages logged to each channel. 5. In the Server Properties window, select the Logging tab to specify which message categories are logged to each channel. Troubleshooting tip about the severity level The i5os_joblog channel default severity level is set to Error. This setting is used to reduce the volume of informational and warning messages, which can otherwise degrade performance. If you are experiencing problems but the job log is not indicating the source of the problem, you might need to change the severity level. Follow the procedure above to access the Channels page and change the severity level for the i5os_joblog channel to Warning, Notice, or Info so you can view more logging data. After you have resolved the problem, reset the severity level to Error to reduce the number of messages in the job log. Domain Name System 39

46 Changing Domain Name System debug settings The Domain Name System (DNS) debug function can provide information that can help you determine and correct DNS server problems. DNS offers 12 levels of debug control. Logging typically provides an easier method of finding problems, but in some cases debugging might be necessary. Under normal conditions, debugging is turned off (value = 0). It is recommended that you first use logging to attempt to correct problems. Valid debug levels are 0 through 11. Your IBM service representative can help you determine the appropriate debug value for diagnosing your DNS problem. Values of 1 or higher write debug information to the named.run file in your IBM i directory path: /QIBM/UserData/OS400/DNS/<server instance>, where <server instance> is the name of the DNS server instance. The named.run file continues to grow as long as the debug level is set to 1 or higher, and the DNS server continues to run. You can also use the Server Properties - Channels page to specify preferences for the maximum size and the number of versions of the named.run file. To change the debug value for a DNS server instance, follow these steps: 1. In System i Navigator, expand your system > Network > Servers > DNS. 2. In the right pane, right-click your DNS server and select Configuration. 3. In the DNS configuration window, right-click the DNS server and select Properties. 4. On the Server Properties - General page, specify the server startup debug level. 5. If the server is running, stop and restart the server. Note: Changes to the debug level do not take effect while the server is running. The debug level set here will be used the next time the server is fully restarted. If you need to change the debug level while the server is running, see Advanced DNS features. Related concepts: Advanced Domain Name System features on page 36 This topic explains how experienced administrators can use Domain Name System (DNS) advanced features to manage a DNS server more easily. Related information for Domain Name System IBM Redbooks publications, Web sites, and other information center topic collections contain information that relates to the Domain Name System (DNS) topic collection. You can view or print any of the PDF files. IBM Redbooks AS/400 TCP/IP Autoconfiguration: DNS and DHCP Support (5181 KB) This Redbooks publication describes the Domain Name System (DNS) server and Dynamic Host Configuration Protocol (DHCP) server support that are included in IBM i. It can help you install, tailor, configure, and troubleshoot DNS and DHCP support through examples. Web sites v DNS and BIND, fifth edition. Paul Albitz and Cricket Liu. Published by O'Reilly and Associates,Inc. Sebastopol, California, ISBN number: v The BIND Administrator Reference Manual (in PDF version) from the Internet System Consortium (ISC) Web site. 40 System i: Networking Domain Name System

47 v The Internet Software Consortium Web site contains news, links, and other resources for BIND. v The InterNIC site maintains a directory of all domain name registrars that are authorized by the Internet Corporation for Assigned Names and Numbers (ICANN). v The DNS Resources Directory provides DNS reference material and links to many other DNS resources, including discussion groups. It also provides a listing of DNS related RFCs. Related reference: PDF file for Domain Name System on page 1 You can view and print a PDF file of this information. Domain Name System 41

48 42 System i: Networking Domain Name System

49 Appendix. Notices This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-ibm product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not grant you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing IBM Corporation North Castle Drive Armonk, NY U.S.A. For license inquiries regarding double-byte (DBCS) information, contact the IBM Intellectual Property Department in your country or send inquiries, in writing, to: IBM World Trade Asia Corporation Licensing 2-31 Roppongi 3-chome, Minato-ku Tokyo , Japan The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-ibm Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you. Licensees of this program who wish to have information about it for the purpose of enabling: (i) the exchange of information between independently created programs and other programs (including this one) and (ii) the mutual use of the information which has been exchanged, should contact: IBM Corporation Copyright IBM Corp. 1998,

50 Software Interoperability Coordinator, Department YBWA 3605 Highway 52 N Rochester, MN U.S.A. Such information may be available, subject to appropriate terms and conditions, including in some cases, payment of a fee. The licensed program described in this document and all licensed material available for it are provided by IBM under terms of the IBM Customer Agreement, IBM International Program License Agreement, IBM License Agreement for Machine Code, or any equivalent agreement between us. Any performance data contained herein was determined in a controlled environment. Therefore, the results obtained in other operating environments may vary significantly. Some measurements may have been made on development-level systems and there is no guarantee that these measurements will be the same on generally available systems. Furthermore, some measurements may have been estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment. Information concerning non-ibm products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-ibm products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. All statements regarding IBM's future direction or intent are subject to change or withdrawal without notice, and represent goals and objectives only. This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. COPYRIGHT LICENSE: This information contains sample application programs in source language, which illustrate programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. Each copy or any portion of these sample programs or any derivative work, must include a copyright notice as follows: (your company name) (year). Portions of this code are derived from IBM Corp. Sample Programs. Copyright IBM Corp. _enter the year or years_. All rights reserved. If you are viewing this information softcopy, the photographs and color illustrations may not appear. Programming interface information This Domain Name System (DNS) publication documents intended Programming Interfaces that allow the customer to write programs to obtain the services of IBM i5/os. 44 System i: Networking Domain Name System

51 Trademarks The following terms are trademarks of International Business Machines Corporation in the United States, other countries, or both: AS/400 i5/os IBM IBM (logo) OS/400 Redbooks System i Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. Other company, product, or service names may be trademarks or service marks of others. Terms and conditions Permissions for the use of these publications is granted subject to the following terms and conditions. Personal Use: You may reproduce these publications for your personal, noncommercial use provided that all proprietary notices are preserved. You may not distribute, display or make derivative works of these publications, or any portion thereof, without the express consent of IBM. Commercial Use: You may reproduce, distribute and display these publications solely within your enterprise provided that all proprietary notices are preserved. You may not make derivative works of these publications, or reproduce, distribute or display these publications or any portion thereof outside your enterprise, without the express consent of IBM. Except as expressly granted in this permission, no other permissions, licenses or rights are granted, either express or implied, to the publications or any information, data, software or other intellectual property contained therein. IBM reserves the right to withdraw the permissions granted herein whenever, in its discretion, the use of the publications is detrimental to its interest or, as determined by IBM, the above instructions are not being properly followed. You may not download, export or re-export this information except in full compliance with all applicable laws and regulations, including all United States export laws and regulations. IBM MAKES NO GUARANTEE ABOUT THE CONTENT OF THESE PUBLICATIONS. THE PUBLICATIONS ARE PROVIDED "AS-IS" AND WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT, AND FITNESS FOR A PARTICULAR PURPOSE. Appendix. Notices 45

52 46 System i: Networking Domain Name System

53

54 Printed in USA

Networking Domain Name System

Networking Domain Name System System i Networking Domain Name System Version 5 Release 4 System i Networking Domain Name System Version 5 Release 4 Note Before using this information and the product it supports, read the information

More information

Networking Domain Name System

Networking Domain Name System IBM i Networking Domain Name System Version 7.2 IBM i Networking Domain Name System Version 7.2 Note Before using this information and the product it supports, read the information in Notices on page

More information

Copyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure

Copyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure iseries DNS iseries DNS Copyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule

More information

Introduction to DNS CHAPTER 5. In This Chapter

Introduction to DNS CHAPTER 5. In This Chapter 297 CHAPTER 5 Introduction to DNS Domain Name System (DNS) enables you to use hierarchical, friendly names to easily locate computers and other resources on an IP network. The following sections describe

More information

How to Add Domains and DNS Records

How to Add Domains and DNS Records How to Add Domains and DNS Records Configure the Barracuda NextGen X-Series Firewall to be the authoritative DNS server for your domains or subdomains to take advantage of Split DNS or dead link detection.

More information

Installing and Setting up Microsoft DNS Server

Installing and Setting up Microsoft DNS Server Training Installing and Setting up Microsoft DNS Server Introduction Versions Used Windows Server 2003 Setup Used i. Server Name = martini ii. Credentials: User = Administrator, Password = password iii.

More information

Module 2. Configuring and Troubleshooting DNS. Contents:

Module 2. Configuring and Troubleshooting DNS. Contents: Configuring and Troubleshooting DNS 2-1 Module 2 Configuring and Troubleshooting DNS Contents: Lesson 1: Installing the DNS Server Role 2-3 Lesson 2: Configuring the DNS Server Role 2-9 Lesson 3: Configuring

More information

How to Configure the Windows DNS Server

How to Configure the Windows DNS Server Windows 2003 How to Configure the Windows DNS Server How to Configure the Windows DNS Server Objective This document demonstrates how to configure domains and record on the Windows 2003 DNS Server. Windows

More information

Copyright 2012 http://itfreetraining.com

Copyright 2012 http://itfreetraining.com In order to find resources on the network, computers need a system to look up the location of resources. This video looks at the DNS records that contain information about resources and services on the

More information

Glossary of Technical Terms Related to IPv6

Glossary of Technical Terms Related to IPv6 AAAA Record An AAAA record stores a 128-bit Internet Protocol version 6 (IPv6) address, which does not fit the standard A record format. For example, 2007:0db6:85a3:0000:0000:6a2e:0371:7234 is a valid

More information

How To Plan Out Your Own Version Of Hpl (Dhcp) On A Network With A Network (Dns) On Your Network (Dhpl) On An Ipad Or Ipad On A Pc Or Ipa On A Server On A

How To Plan Out Your Own Version Of Hpl (Dhcp) On A Network With A Network (Dns) On Your Network (Dhpl) On An Ipad Or Ipad On A Pc Or Ipa On A Server On A System i Networking Dynamic Host Configuration Protocol Version 5 Release 4 System i Networking Dynamic Host Configuration Protocol Version 5 Release 4 Note Before using this information and the product

More information

How to set up the Integrated DNS Server for Inbound Load Balancing

How to set up the Integrated DNS Server for Inbound Load Balancing How to set up the Integrated DNS Server for Introduction Getting Started Peplink Balance has a built-in DNS server for inbound link load balancing. You can delegate a domain s NS/SOA records, e.g. www.mycompany.com,

More information

- Domain Name System -

- Domain Name System - 1 Name Resolution - Domain Name System - Name resolution systems provide the translation between alphanumeric names and numerical addresses, alleviating the need for users and administrators to memorize

More information

How to Configure DNS Zones

How to Configure DNS Zones How to Configure DNS Zones The Barracuda NG Firewall DNS configuration object contains two predefined zones: _template and. To be able to edit and specify DNS zones within the Barracuda NG Firewall DNS

More information

Use Domain Name System and IP Version 6

Use Domain Name System and IP Version 6 Use Domain Name System and IP Version 6 What You Will Learn The introduction of IP Version 6 (IPv6) into an enterprise environment requires some changes both in the provisioned Domain Name System (DNS)

More information

Understand Names Resolution

Understand Names Resolution Understand Names Resolution Lesson Overview In this lesson, you will learn about: Domain name resolution Name resolution process steps DNS WINS Anticipatory Set 1. List the host name of 4 of your favorite

More information

DNS. The Root Name Servers. DNS Hierarchy. Computer System Security and Management SMD139. Root name server. .se name server. .

DNS. The Root Name Servers. DNS Hierarchy. Computer System Security and Management SMD139. Root name server. .se name server. . Computer System Security and Management SMD139 Lecture 5: Domain Name System Peter A. Jonsson DNS Translation of Hostnames to IP addresses Hierarchical distributed database DNS Hierarchy The Root Name

More information

Understanding DNS (the Domain Name System)

Understanding DNS (the Domain Name System) Understanding DNS (the Domain Name System) A white paper by Incognito Software January, 2007 2007 Incognito Software Inc. All rights reserved. Understanding DNS (the Domain Name System) Introduction...2

More information

DNS. Computer networks - Administration 1DV202. fredag 30 mars 12

DNS. Computer networks - Administration 1DV202. fredag 30 mars 12 DNS Computer networks - Administration 1DV202 DNS History Who needs DNS? The DNS namespace How DNS works The DNS database The BIND software Server and client configuration The history of DNS RFC 882 and

More information

DNS ActiveX Control for Microsoft Windows. Copyright Magneto Software All rights reserved

DNS ActiveX Control for Microsoft Windows. Copyright Magneto Software All rights reserved DNS ActiveX Control for Microsoft Windows Copyright Magneto Software All rights reserved 1 DNS Overview... 3 1.1 Introduction... 3 1.2 Usage... 3 1.3 Property... 4 1.4 Event... 4 1.5 Method... 4 1.6 Error

More information

Array Networks NetContinuum. Netli. Fine Ground. StrangeLoop. Akamai. Barracuda. Aptimize. Inkra. Nortel. Juniper. Cisco. Brocade/Foundry.

Array Networks NetContinuum. Netli. Fine Ground. StrangeLoop. Akamai. Barracuda. Aptimize. Inkra. Nortel. Juniper. Cisco. Brocade/Foundry. Array Networks NetContinuum Netli Barracuda StrangeLoop Inkra Fine Ground Aptimize Akamai Cisco Citrix Juniper Zeus Radware Nortel ActivNetworks Brocade/Foundry Swan Labs A10 Redline Coyote Point Crescendo

More information

HTG XROADS NETWORKS. Network Appliance How To Guide: EdgeDNS. How To Guide

HTG XROADS NETWORKS. Network Appliance How To Guide: EdgeDNS. How To Guide HTG X XROADS NETWORKS Network Appliance How To Guide: EdgeDNS How To Guide V 3. 2 E D G E N E T W O R K A P P L I A N C E How To Guide EdgeDNS XRoads Networks 17165 Von Karman Suite 112 888-9-XROADS V

More information

DNS: How it works. DNS: How it works (more or less ) DNS: How it Works. Technical Seminars Spring 2010 1. Paul Semple psemple@rm.

DNS: How it works. DNS: How it works (more or less ) DNS: How it Works. Technical Seminars Spring 2010 1. Paul Semple psemple@rm. DNS: How it works Paul Semple [email protected] DNS: How it works (more or less ) Paul Semple [email protected] 1 Objectives What DNS is and why we need it DNS on Windows Server networks / Community Connect

More information

Fasthosts Internet Parallels Plesk 10 Manual

Fasthosts Internet Parallels Plesk 10 Manual Fasthosts Internet Parallels Plesk 10 Manual Introduction... 2 Before you begin... 2 Logging in to the Plesk control panel... 2 Securing access to the Plesk 10 control panel... 3 Configuring your new server...

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure

More information

Introduction to Network Operating Systems

Introduction to Network Operating Systems As mentioned earlier, different layers of the protocol stack use different kinds of addresses. We can now see that the Transport Layer (TCP) uses port addresses to route data to the correct process, the

More information

Windows 2008 Server. Domain Name System Administración SSII

Windows 2008 Server. Domain Name System Administración SSII Windows 2008 Server Domain Name System Administración SSII Contenidos Introducción Configuración DNS Transferencia de zona Herramientas DNS Introducción Domain Name System is a hierarchical distributed

More information

Networking TCP/IP routing and workload balancing

Networking TCP/IP routing and workload balancing System i Networking TCP/IP routing and workload balancing Version 5 Release 4 System i Networking TCP/IP routing and workload balancing Version 5 Release 4 Note Before using this information and the product

More information

Domain Name System 2015-04-28 17:49:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Domain Name System 2015-04-28 17:49:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Domain Name System 2015-04-28 17:49:44 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Domain Name System... 4 Domain Name System... 5 How DNS Works

More information

netkit lab dns Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Version Author(s)

netkit lab dns Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Version Author(s) Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab dns Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani, M.

More information

How To Guide Edge Network Appliance How To Guide:

How To Guide Edge Network Appliance How To Guide: How To Guide Edge Network Appliance How To Guide: ActiveDNS v 4.01 Edge Network Appliance How To Guide: ActiveDNS 2007 XRoads Networks 17165 Von Karman, Suite 112 888-9-XROADS v 4.01 updated 09/11/07 Table

More information

Security Digital Certificate Manager

Security Digital Certificate Manager IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,

More information

ERserver. iseries. Networking TCP/IP Setup

ERserver. iseries. Networking TCP/IP Setup ERserver iseries Networking TCP/IP Setup ERserver iseries Networking TCP/IP Setup Copyright International Business Machines Corporation 1998, 2001. All rights reserved. US Government Users Restricted

More information

Implementing Domain Name Service (DNS)

Implementing Domain Name Service (DNS) Implementing Domain Name Service (DNS) H C A 1 P T E R ITINERARY Objective 1.01 Objective 1.02 Objective 1.03 Install and Configure DNS for Active Directory Integrate Active Directory DNS Zones with Existing

More information

Deploying & Configuring a DNS Server on OpenServer 6 or UnixWare 7. Kirk Farquhar

Deploying & Configuring a DNS Server on OpenServer 6 or UnixWare 7. Kirk Farquhar Deploying & Configuring a DNS Server on OpenServer 6 or UnixWare 7 Kirk Farquhar 1 Content Introduction Bind 8 & Bind 9 Administering a DNS Server H2N Using DNS Manager The SCO Resolvers Firewall Issues

More information

The Use of DNS Resource Records

The Use of DNS Resource Records International Journal of Advances in Electrical and Electronics Engineering 230 Available online at www.ijaeee.com & www.sestindia.org/volume-ijaeee/ ISSN: 2319-1112 Simar Preet Singh Systems Engineer,

More information

DNS. Computer Networks. Seminar 12

DNS. Computer Networks. Seminar 12 DNS Computer Networks Seminar 12 DNS Introduction (Domain Name System) Naming system used in Internet Translate domain names to IP addresses and back Communication works on UDP (port 53), large requests/responses

More information

THE MASTER LIST OF DNS TERMINOLOGY. First Edition

THE MASTER LIST OF DNS TERMINOLOGY. First Edition THE MASTER LIST OF DNS TERMINOLOGY First Edition DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To

More information

Application Protocols in the TCP/IP Reference Model. Application Protocols in the TCP/IP Reference Model. DNS - Concept. DNS - Domain Name System

Application Protocols in the TCP/IP Reference Model. Application Protocols in the TCP/IP Reference Model. DNS - Concept. DNS - Domain Name System Application Protocols in the TCP/IP Reference Model Application Protocols in the TCP/IP Reference Model File Transfer E-Mail Network Management Protocols of the application layer are common communication

More information

Application Protocols in the TCP/IP Reference Model

Application Protocols in the TCP/IP Reference Model Application Protocols in the TCP/IP Reference Model File Transfer E-Mail Network Management WWW Virtual Terminal Name Service File Transfer HTTP FTP Telnet SMTP DNS SNMP TFTP Internet protocols TCP UDP

More information

Talk-101 User Guide. DNSGate

Talk-101 User Guide. DNSGate Talk-101 User Guide DNSGate What is DNSGate? DNSGate is a management interface to allow you to make DNS changes to your domain. The interface supports A, CNAME, MX and TXT records. What is DNS? DNS stands

More information

ECE 4321 Computer Networks. Network Programming

ECE 4321 Computer Networks. Network Programming ECE 4321 Computer Networks Network Programming Name Space System.Net Domain Name System (DNS) To resolve computer naming Host database is split up and distributed among multiple systems on the Internet

More information

KB259302 - Windows 2000 DNS Event Messages 1 Through 1614

KB259302 - Windows 2000 DNS Event Messages 1 Through 1614 Page 1 of 6 Knowledge Base Windows 2000 DNS Event Messages 1 Through 1614 PSS ID Number: 259302 Article Last Modified on 10/29/2003 The information in this article applies to: Microsoft Windows 2000 Server

More information

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0 THE MASTER LIST OF DNS TERMINOLOGY v 2.0 DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To help people

More information

IBM i. Networking E-mail. Version 7.2

IBM i. Networking E-mail. Version 7.2 IBM i Networking E-mail Version 7.2 IBM i Networking E-mail Version 7.2 Note Before using this information and the product it supports, read the information in Notices on page 53. This document may contain

More information

Managing Name Resolution

Managing Name Resolution 3 CHAPTER THREE Managing Name Resolution Terms you ll need to understand: Windows Internet Naming Service (WINS) WINS Proxy Agent LMHOSTS Tombstoning Persistent Connections Push/pull partner Hostnames

More information

Bulk DNS Update CSV File

Bulk DNS Update CSV File Bulk DNS Updates Bulk DNS Update CSV File Each line in the comma-separated value (CSV) file represents a resource record. A line break must follow each line, and the file may contain up to 5000 lines.

More information

Domain Name System Security

Domain Name System Security Abstract Domain Name System Security Ladislav Hagara [email protected] Department of Automated Command Systems and Informatics Military Academy in Brno Brno, Czech Republic Domain Name System (DNS) is one of

More information

Securing an Internet Name Server

Securing an Internet Name Server Securing an Internet Name Server Cricket Liu [email protected] Securing an Internet Name Server Name servers exposed to the Internet are subject to a wide variety of attacks: Attacks against the name

More information

The Domain Name System

The Domain Name System DNS " This is the means by which we can convert names like news.bbc.co.uk into IP addresses like 212.59.226.30 " Purely for the benefit of human users: we can remember numbers (e.g., telephone numbers),

More information

Networking Security IP packet security

Networking Security IP packet security Networking Security IP packet security Networking Security IP packet security Copyright International Business Machines Corporation 1998,2000. All rights reserved. US Government Users Restricted Rights

More information

CHAPTER ANSWERS IMPLEMENTING, MANAGING, AND MAINTAINING A MICROSOFT WINDOWS SERVER 2003 NETWORK INFRASTRUCTURE

CHAPTER ANSWERS IMPLEMENTING, MANAGING, AND MAINTAINING A MICROSOFT WINDOWS SERVER 2003 NETWORK INFRASTRUCTURE CHAPTER S IMPLEMENTING, MANAGING, AND MAINTAINING A MICROSOFT WINDOWS SERVER 2003 NETWORK INFRASTRUCTURE 2 TEXTBOOK CHAPTER 1 S: IMPLEMENTING DHCP CHAPTER 1 IMPLEMENTING DHCP CHAPTER REVIEW QUESTIONS 1.

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (jaamsp_mngnwi-025) Lisa would like to configure five of her 15 Web servers, which are running Microsoft Windows Server 2003, Web Edition, to always receive specific IP addresses

More information

Enterprise Architecture Office Resource Document Design Note - Domain Name System (DNS)

Enterprise Architecture Office Resource Document Design Note - Domain Name System (DNS) Date: 8/27/2012 Enterprise Architecture Office Resource Document Design Note - Domain Name System (DNS) Table of Contents 1 Overview...2 1.1 Other Resources...2 1.1.1 State of Minnesota Standards and Guidelines...2

More information

Lesson Plans Managing a Windows 2003 Network Infrastructure

Lesson Plans Managing a Windows 2003 Network Infrastructure Lesson Plans Managing a Windows 2003 Network Infrastructure (Exam 70-291) Table of Contents Course Overview... 2 Section 0.1: Introduction... 3 Section 1.1: Client Configuration... 4 Section 1.2: IP Addressing...

More information

GL-275: Red Hat Linux Network Services. Course Outline. Course Length: 5 days

GL-275: Red Hat Linux Network Services. Course Outline. Course Length: 5 days GL-275: Red Hat Linux Network Services Course Length: 5 days Course Description: The GL275 is an expansive course that covers a wide range of network services useful to every organization. Special attention

More information

Motivation. Domain Name System (DNS) Flat Namespace. Hierarchical Namespace

Motivation. Domain Name System (DNS) Flat Namespace. Hierarchical Namespace Motivation Domain Name System (DNS) IP addresses hard to remember Meaningful names easier to use Assign names to IP addresses Name resolution map names to IP addresses when needed Namespace set of all

More information

System i and System p. Customer service, support, and troubleshooting

System i and System p. Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting Note Before using this information and the product it supports,

More information

Domain Name System (DNS) Fundamentals

Domain Name System (DNS) Fundamentals Domain Name System (DNS) Fundamentals Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International

More information

Appendix D: Configuring Firewalls and Network Address Translation

Appendix D: Configuring Firewalls and Network Address Translation Appendix D: Configuring Firewalls and Network Address Translation The configuration information in this appendix will help the network administrator plan and configure the network architecture for Everserve.

More information

Module 5: Planning a DNS Strategy

Module 5: Planning a DNS Strategy Module 5: Planning a DNS Strategy Contents Overview 1 Lesson: Planning DNS Servers 2 Multimedia: How DNS Clients Resolve Names 3 Multimedia: Resolving Names with a DNS Server 8 Lesson: Planning a Namespace

More information

Section 1 Overview... 4. Section 2 Home... 5

Section 1 Overview... 4. Section 2 Home... 5 ecogent User Guide 2012 Cogent Communications, Inc. All rights reserved. Every effort has been made to ensure that the information in this User Guide is accurate. Information in this document is subject

More information

Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System

Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System Lecture 2 CS 3311 An example of a middleware service: DNS Domain Name System The problem Networked computers have names and IP addresses. Applications use names; IP uses for routing purposes IP addresses.

More information

DNS and DHCP. 14 October 2008 University of Reading 2006 www.reading.ac.uk

DNS and DHCP. 14 October 2008 University of Reading 2006 www.reading.ac.uk DNS and DHCP 14 October 2008 University of Reading 2006 www.reading.ac.uk Contents Introduction DNS at the University of Reading DHCP myths DHCP at the University of Reading 2 Introduction DNS: Domain

More information

Chapter 25 Domain Name System. 25.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 25 Domain Name System. 25.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 25 Domain Name System 25.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 25.2 Figure 25.1 Example of using the DNS service 25-1 NAME SPACE To be unambiguous,

More information

THE DOMAIN NAME SYSTEM DNS

THE DOMAIN NAME SYSTEM DNS Announcements THE DOMAIN NAME SYSTEM DNS Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University copyright 2005 Douglas S. Reeves 2 Today s Lecture I. Names vs. Addresses II. III. IV. The Namespace

More information

CS3250 Distributed Systems

CS3250 Distributed Systems CS3250 Distributed Systems Lecture 4 More on Network Addresses Domain Name System DNS Human beings (apart from network administrators and hackers) rarely use IP addresses even in their human-readable dotted

More information

Security Service tools user IDs and passwords

Security Service tools user IDs and passwords System i Security Service tools user IDs and passwords Version 5 Release 4 System i Security Service tools user IDs and passwords Version 5 Release 4 Note Before using this information and the product

More information

DNS Conformance Test Specification For Client

DNS Conformance Test Specification For Client DNS Conformance Test Specification For Client Revision 1.0 Yokogawa Electric Corporation References This test specification focus on following DNS related RFCs. RFC 1034 DOMAIN NAMES - CONCEPTS AND FACILITIES

More information

Domain Name Server. Training Division National Informatics Centre New Delhi

Domain Name Server. Training Division National Informatics Centre New Delhi Domain Name Server Training Division National Informatics Centre New Delhi Domain Name Service (DNS) I. History of DNS II. DNS structure and its components III. Functioning of DNS IV. Possible Configurations

More information

DNS and E-mail Interface User Guide

DNS and E-mail Interface User Guide DNS and E-mail Interface User Guide Document Revision 04 // 2012 www.twcbc.com back back to TOC to TOC Header Text and Info Table of Contents 1. Introduction 3 2. Accessing the Application 4 3. Working

More information

5 Configuring a DNS Infrastructure

5 Configuring a DNS Infrastructure 5 Configuring a DNS Infrastructure Exam Objectives in this Chapter: Configure a DNS server. Configure DNS zone options. Configure DNS forwarding. Manage DNS zone settings. Manage DNS server options. Why

More information

Using Webmin and Bind9 to Setup DNS Sever on Linux

Using Webmin and Bind9 to Setup DNS Sever on Linux Global Open Versity Systems Integration Hands-on Labs Training Manual Using Webmin and Bind9 to Setup DNS Sever on Linux By Kefa Rabah, [email protected] March 2008 Installing and Configuring

More information

FAQ (Frequently Asked Questions)

FAQ (Frequently Asked Questions) FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias

More information

Lesson 13: DNS Security. Javier Osuna [email protected] GMV Head of Security and Process Consulting Division

Lesson 13: DNS Security. Javier Osuna josuna@gmv.com GMV Head of Security and Process Consulting Division Lesson 13: DNS Security Javier Osuna [email protected] GMV Head of Security and Process Consulting Division Introduction to DNS The DNS enables people to use and surf the Internet, allowing the translation

More information

Configuring DNS. Finding Feature Information

Configuring DNS. Finding Feature Information The Domain Name System (DNS) is a distributed database in which you can map hostnames to IP addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated hostname.

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

KAREL UCAP DNS AND DHCP CONCEPTS MANUAL MADE BY: KAREL ELEKTRONIK SANAYI ve TICARET A.S. Organize Sanayi Gazneliler Caddesi 10

KAREL UCAP DNS AND DHCP CONCEPTS MANUAL MADE BY: KAREL ELEKTRONIK SANAYI ve TICARET A.S. Organize Sanayi Gazneliler Caddesi 10 KAREL UCAP DNS AND DHCP CONCEPTS MANUAL MADE BY: KAREL ELEKTRONIK SANAYI ve TICARET A.S. Organize Sanayi Gazneliler Caddesi 10 Sincan 06935 Ankara, Turkey Version Table Manual Version/Date AAA/22.03.2011

More information

Networking Best Practices Guide. Version 6.5

Networking Best Practices Guide. Version 6.5 Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form

More information

Agenda. Network Services. Domain Names. Domain Name. Domain Names Domain Name System Internationalized Domain Names. Domain Names & DNS

Agenda. Network Services. Domain Names. Domain Name. Domain Names Domain Name System Internationalized Domain Names. Domain Names & DNS Agenda Network Services Domain Names & DNS Domain Names Domain Name System Internationalized Domain Names Johann Oberleitner SS 2006 Domain Names Naming of Resources Problems of Internet's IP focus IP

More information

Simple DNS Plus. Version 4.00. Copyright 1999-2005 JH Software

Simple DNS Plus. Version 4.00. Copyright 1999-2005 JH Software Simple DNS Plus Version 4.00 I Simple DNS Plus Table of Contents Part I Welcome 4 Part II How to... 4 1 Get started... 4 2 Host a domain... name 5 3 Setup primary... / secondary 6 4 Secure you server...

More information

Click Studios. Passwordstate. Installation Instructions

Click Studios. Passwordstate. Installation Instructions Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior

More information

How-to: DNS Enumeration

How-to: DNS Enumeration 25-04-2010 Author: Mohd Izhar Ali Email: [email protected] Website: http://johncrackernet.blogspot.com Table of Contents How-to: DNS Enumeration 1: Introduction... 3 2: DNS Enumeration... 4 3: How-to-DNS

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503

More information

Tunnel Client FAQ. Table of Contents. Version 0v5, November 2014 Revised: Kate Lance Author: Karl Auer

Tunnel Client FAQ. Table of Contents. Version 0v5, November 2014 Revised: Kate Lance Author: Karl Auer Tunnel Client FAQ Version 0v5, November 2014 Revised: Kate Lance Author: Karl Auer Table of Contents A. Tunnelling 1 How does tunnelling work? 2 What operating systems are supported? 3 Where can I get

More information

Solaris Networking Guide. Stewart Watkiss. Volume. New User To Technical Expert Solaris Bookshelf. This document is currently under construction

Solaris Networking Guide. Stewart Watkiss. Volume. New User To Technical Expert Solaris Bookshelf. This document is currently under construction Volume 3 New User To Technical Expert Solaris Bookshelf Stewart Watkiss This document is currently under construction This version is to be considered a preview only Solaris Networking Guide Copyright

More information

Windows Active Directory. DNS, Kerberos and LDAP T h u r s d a y, J a n u a r y 2 7, 2011 INLS 576 Spring 2011

Windows Active Directory. DNS, Kerberos and LDAP T h u r s d a y, J a n u a r y 2 7, 2011 INLS 576 Spring 2011 Windows Active Directory DNS, Kerberos and LDAP T h u r s d a y, J a n u a r y 2 7, 2011 INLS 576 Spring 2011 1 DNS? LDAP? Kerberos? Active Directory relies of DNS to register and locate services Active

More information

DNS at NLnet Labs. Matthijs Mekking

DNS at NLnet Labs. Matthijs Mekking DNS at NLnet Labs Matthijs Mekking Topics NLnet Labs DNS DNSSEC Recent events NLnet Internet Provider until 1997 The first internet backbone in Holland Funding research and software projects that aid the

More information

ENTERPRISE LINUX NETWORKING SERVICES

ENTERPRISE LINUX NETWORKING SERVICES ENTERPRISE LINUX NETWORKING SERVICES The is an expansive course that covers a wide range of network services useful to every organization. Special attention is paid to the concepts needed to implement

More information

Red Hat system-config-bind BIND (Berkeley Internet Name Domain) DNS ( Domain Name System)

Red Hat system-config-bind BIND (Berkeley Internet Name Domain) DNS ( Domain Name System) Red Hat system-config-bind BIND (Berkeley Internet Name Domain) DNS ( Domain Name System) Configuration tool User Guide and Manual Jason Vas Dias Copyright ( ) Red Hat Inc. 2005 Table

More information

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1 Virtual Appliances Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V Virtual Appliance Setup Guide for Umbrella Page 1 Table of Contents Overview... 3 Prerequisites... 4 Virtualized Server

More information

DNS Resolving using nslookup

DNS Resolving using nslookup DNS Resolving using nslookup Oliver Hohlfeld & Andre Schröder January 8, 2007 Abstract This report belongs to a talk given at the networking course (Institue Eurecom, France) in January 2007. It is based

More information

My Services Online Service Support. User Guide for DNS and NTP services

My Services Online Service Support. User Guide for DNS and NTP services My Services Online Service Support User Guide for DNS and NTP services Table of Contents 1 MY SERVICES... 3 2 ACCESSING MY SERVICES VIA THE INTERNET... 3 2.1 Logging into My Services... 3 2.2 My Services

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information